The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In smart grid, more and more people and communities pay their attentions to the privacy protection issues. Some researchers try to use homomorphic encryption to protect users' privacy and achieve a certain result. However it also brings new problems, such as Energy Suppliers (ES) cannot detect whether the Smart Meter (SM) data is correct. Assume that the key used for encryption of SM data may be known...
Cloud computing is gaining tremendous momentum in both academia and industry, with more and more people and enterprises migrating their data and applications into the cloud. Cloud computing provides a new computing model with elastic scaling, a resource pool of unprecedented size, and the on-demand resource provisioning mechanism, which bring numerous challenges in implementing workflow management...
After the instruction of FCS and Time, a new proxy signature is proposed. The new scheme not only has the properties of proxy signature, but also greatly improves the security.
Recently, multihop wireless mesh networks (WMNs) have attracted increasing attention and deployment as a low-cost approach to provide broadband Internet access at metropolitan scale. Security and privacy issues are of most concern in pushing the success of WMNs for their wide deployment and for supporting service-oriented applications. Despite the necessity, limited security research has been conducted...
Information is an irreversible general trend of social and world economy's development. E-government means to make full use of information technology to enhance the effective management of the government, in order to promote transformation of government functions and improve management level. However, e-government faces with some problems, such as security issues. First, this paper analyzes the characteristics...
The performance gap between the execution speed of security software and the amount of data to be processed is ever widening. A common solution is to close the performance gap through hardware implementation of security functions. However, continuously expanding signature databases have become a major impediment to achieving scalable hardware based pattern matching. Additionally, evolutionary rule...
Virtualization makes virtual machines with a wide range of security requirements run simultaneously on the same commodity hardware. Direct Anonymous Attestation (DAA) for virtual machine is a cryptographic mechanism that enables remote attestation of virtual machine instances ( VMIs ) while preserving privacy under the user's control. However, trusted platform module (TPM) with only limited storage...
In this paper, we presented a novel ring signature scheme in which the actual signer has the ability to admit having signed a document at his will. It's an extension and improvement of the ring signature suggested by Rivest et al. in 2001. This extended ring signature is valuable in real-life application. An actual signer may possibly want to expose himself if he will acquire enormous benefit. Based...
A designated verifier signature (DVS) scheme has the property that only the designated verifier specified by the signer can check the validity of the signature instead of anyone else. Meanwhile, the designated verifier can not use this proof to convince any third party that a signature is generated by the claimed signer. Consider the application of three-party communication environment. One party...
This paper analyzes the limitation of conventional digital multi-signature. By utilizing the structure predominance of the XML documents and the security of conventional digital signature, we propose a multi-signature scheme of XML documents based on RSA. In our scheme, we use the Xpath to transform an XML document into subdocument, and each participant signer signs the sub-document that they are...
A novel generation key scheme based on DNA is proposed. By using a key expansion matrix, the scheme improves the independence and the strict avalanche of the key. Although it increases computation amount because of using the matrix operation, the random number can be generated by the DNA sequence directly and the speed of the computation is greatly improved. Therefore, the new scheme has wide application...
In this paper, we propose a Combined Public Key Cryptosystem based on Conic Curves (CPK-CCC) over the residue class ring without trusted third parties, assume the existence of trusted Key Management Center (KMC). The security of this scheme relies on the problem of factorizing large integer and computing discrete logarithm on conic over the residue class ring. The implementation principles of CPK-CCC...
How to overcome the conspiracy attacks on threshold signature is very important problem. To resist the conspiracy attacks, many threshold signature schemes are based on the complicated variants of the Lagrange interpolation sharing scheme. Based on Asmuth-Bloom modular secret sharing, a new threshold signature scheme is proposed. The scheme can resist the conspiracy attacks, and is more efficient...
A ring signature scheme enables a signer, in an ad hoc manner, to sign a signature on behalf of a group of users including himself such that a verifier can be convinced that one of the identified users actually generated the signature but he cannot identify the actual signer. In this paper, we propose a highly efficient ID-based ring signature from pairings that requires only one pairing operation,...
In wireless mesh networks (WMNs), preserving users' privacy is an important but contradictory to security issue. To provide a new solution to the challenge, we propose an anonymous authentication scheme based on CPK and blind signature in the elliptic curve domain. The proposed scheme can not only provide fast and explicit mutual authentication between nodes, but also effectively preserve mesh users'...
To provide more confidence to users of digital signatures, recently, Wei and Yuan et al. proposed two digital signature schemes respectively. They claimed that the security of their schemes is based on factoring and discrete logarithms simultaneously. Moreover, they thought that their schemes accomplish three merits proposed by Shao. In this paper, we show that the two schemes are not secure at all...
Proxy blind signature, which combines the properties of both proxy signature and blind signature, is useful in many applications. Based on ECLDP, Wang et al. recently proposed a proxy blind signature scheme. In this paper, we present a security analysis on Wang's scheme and prove it does not possess the strong nonrepudiation, strong unforgeability and unlink- ability properties by three efficient...
RSA is the most widely used digital signature algorithm in e-commerce and the complexity of large integer operation is the main factor that affects the efficiency of a RSA system. In this paper, a n carry array based large integer denotation approach is proposed to speed up the large integer calculation in RSA key generation and data encryption/decryption process, so as to improve the efficiency of...
In this paper, we propose two server-assisted forward secure signature schemes using Bellare-Miner Scheme. In the first scheme, the user (signer) can employ a server to help her to produce a signature. In the second scheme, the number of employed servers is increased to n, therefore, it is infeasible for an attacker to forge a valid signature if she canpsilat corrupt all servers and the signer. The...
In this paper, an active RFID system integrated public key encryption, embedded computation, and wireless communication technology that is implemented with cryptography and authentication mechanisms. In the system, a secure RFID Tag intermittently transmits cipher text to a RFID Reader which then transmits to a back-end platform to perform data comparison for authentication. Besides, the digital signature...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.