The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a new efficient solution for securely outsourcing linear regression to a public cloud with robust answer verification. Additionally, we show our construction can be utilized to efficiently and securely outsource other large-scale matrix operations, such as determinant computation.
Side-channel attacks and fault attacks use the physical interactions with cryptographic devices to achieve the shortcuts of recovering the secret key. For side-channel attacks, physical information leakage during the cryptographic calculation is measured and statistically analyzed to reveal the intermediate values. For fault attacks, computational faults are intentionally triggered to obtain faulty...
Recently, Au et al. proposed a hierarchical identity-based signature scheme and Hu-Huang proposed a proxy key generation protocol. Based on the both schemes, we present a novel identity-based proxy signature scheme. The proposed scheme is provablly secure in the standard model and its security can be reduced to the hardness assumption of the g-strong Diffie-Hellman problem. Compared with all existing...
Hierarchical wireless sensor networks (HSNs) have been widely used in many applications, especially in military areas. They usually consist of different types of nodes and behave better in performances and reliability than traditional flat wireless sensor networks (FSNs). In this paper, a novel key pre-distribution scheme is proposed for a three-tier HSN. Shamir's secret sharing technique is implemented...
When our private data are out-sourced in cloud computing, we should guarantee the confidentiality and search ability of the private data. However, nowadays privacy preserving issues in the cloud have not been carefully explored at current stage. To relieve individuals' concerns of their data privacy, this paper explores a new approach based on private matching and min-attribute generalization to solve...
Bit Torrent is arguably the most prevalent file sharing protocol on the Internet. In Bit Torrent swarms, seeds usually offer file chunks for free and thus induce free-riding behavior. Some anti-Bit Torrent companies even launch targeted attacks against the seeds. This paper proposes a batch mechanism for proper functioning of the seeds. It applies symmetric-key encryption and chunk mixing to plain...
In this paper, we have implemented a secure communication platform based on a new stream cipher called Gemstone which stems from coupled map lattices (CML), a nonlinear system of coupled chaotic maps. On the platform, we have realized duplex text, image and voice transmission. We have also analyzed the randomness of the keystream generated by the platform based on the statistical tests suggested by...
People increasingly depend on the mobile communication networks, specially the third generation of mobile communication network (3G), to transmit data with one another. Although 3G networks implement data confidentiality and integrity within network components, but don't offer user's end-to-end confidentiality and integrity. End-to-end encryption could improve these vulnerabilities, and facilitates...
Future mobile devices are expected to access different networks (such as 3rd generation network, WLAN, Bluetooth, Internet, and etc). Hence many sensitivity data are stored in them. How to protect the security of information and applications about mobile devices becomes an exigent problem. This paper proposes a secure authentication and authorization protocol for mobile devices. The protocol employs...
Vehicular ad hoc networks (VANETs) have many new characteristics unlike traditional network, such as centriclessness, mobility and multi-hop transmission, which invalidate conventional key managements. The fast development and successful application of trusted computing technology provide a potential solution to achieve effective authentication and trust evaluation. According to the VANETs with hierarchy...
Privacy preserving becomes an important issue in the development progress of data mining techniques. Privacy preserving data mining has become increasingly popular because it allows sharing of privacy-sensitive data for analysis purposes. So people have become increasingly unwilling to share their data, frequently resulting in individuals either refusing to share their data or providing incorrect...
A smart card based scheme is practical and widely used in remote mutual authentication. In 2006, Shieh-Wang pointed out the weakness of Juangpsilas remote mutual authentication scheme using smart card and further proposed a novel one to improve Juangpsilas. The advantages in Shieh-Wangpsilas scheme include effective mutual authentication, freely chosen password, no verification tables, low computational...
Modular inversion is one of the kernel arithmetic operations in error control codes and cryptography, so the design of the low-cost and high-speed hardware implementation is absolutely necessary. A novel algorithm and hardware implementation for modular inversion in finite fields GF(2m) with the standard basis representation is presented. The algorithm used is based on a modification of the extended...
We present three quantum key distribution protocols using entangled state. The first protocol is based on the idea of qubit transmission in blocks. Although it needs quantum memory, its theoretic efficiency approximates to 100%. The second protocol does not need quantum memory and its efficiency for qubits can achieve 100%. The third protocol is a controlled quantum key distribution protocol which...
Finite fields have been used for numerous applications including error-control coding and cryptography. This paper presents a high-speed area-efficient architecture for arithmetic that can support arbitrary irreducible polynomials in GF(2m). The arithmetic unit can perform the Galois field arithmetic operations of addition, subtraction, multiplication, squaring, inversion and division. The least significant...
Access control with strong authentication becomes crucial for the mission critical and safety critical operation of the substation automation system. According to IEC 61850, access control is needed when the user access to functions or the related LNs, especially to operational functions. But the standard only defines a simple way to resolve the access control problem without strong authentication...
Wireless sensor networks are edging closer to widespread feasibility with recent research showing promising results in developing and adapting new mechanisms to suit their environment. Secure communication between these distributed wireless devices is a desired characteristic, especially in scenarios where these sensors will be exploited for military and other mission-critical operations. This paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.