The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a CPA-Secure encryption scheme with equality test. Unlike other public key solutions, in our scheme, only the data owner can encrypt the message and get the comparable ciphertext, and only the tester with token who can perform the equality test. Our encryption scheme is based on multiplicative homomorphism of ElGamal Encryption and Non Interactive Zero Knowledge proof of...
In this paper, we present a two-party identity-based authenticated key exchange protocol from lattice. We prove the security of our scheme under the LWE assumption, without random oracle, in the CK model.
Since more sensitive data are stored and shared on third-party sites, we may need a system capable of one-to-many communication and data encryption without knowing specific recipients. However, the traditional public key crypto system and broadcast encryption system can't solve both of the problems at the same time. Attribute-Based Encryption (ABE) offers both of the desired abilities. In this paper,...
In this paper, we present a two-party attribute-based authenticated key exchange scheme for a wide class of relations, which are specified by non-monotone access structures combined with inner-produce relations. We prove the security of our scheme under the decisional linear (DLIN) assumption, without random oracle, in our ABCK model, which is a natural extension of the CK model.
At first, an convertible ID-based two-party ring signature scheme is designed, in such a scheme, after releasing of a converting information by the real signer, a ring signature can be transformed into a standard signature which can be verified publicly. And then, based on this ring signature, a convertible perfect concurrent signature protocol is proposed. Different from a general concurrent signature,...
Key agreement protocols are essential for secure communications in open and distributed environment. The study of tripartite key agreement has great theoretical and practical significance. Shim and Woo pointed out that the four tripartite authenticated key agreement protocols proposed by Al-Riyami and Paterson were insecure. Modifying the communication messages, an active adversary is able to calculate...
In this paper, we present a two-party attribute-based key agreement protocol, which is secure in random oracle model under the Bilinear Diffe-Hellman assumption. It is inspired by a fuzzy identity-based encryption scheme first proposed by Sahai and Waters. The attribute-based key agreement scheme is a new type of identity-based key agreement scheme, in which we can view identity as a set of descriptive...
Wireless sensor networks are employed in a wide range of applications, and its important position is promoted rapidly. Secure data aggregation is one of important technologies in wireless sensor networks. Here we explore a homomorphic aggregation system based on a public key encryption (PKE) scheme, which can do both additive and multiplicative aggregation as well as mixed the two operations. By far,...
While Shamirpsilas identity-based public key cryptosystem does not need the certificates, the key escrow of userpsilas private keys is inherent in such scheme. In 2003,the concept of certificateless signature scheme was introduced. In this new paradigm, the necessity of certificates has been successfully removed and the key escrow problem does not exist. Based on the ideas of certificateless signatures...
A strong designated-verifier proxy signature scheme was proposed to protect the original signerpsilas interests. In this scheme, the verifier was designated by the original signer. The valid proxy signature generated by the proxy signer on behalf of the original signer can only be accepted by the designated verifier and no body else can be convinced about the proxy signaturespsila validity or invalidity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.