The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A conference-key protocol is used to establish a common conference key K such that a group of people can communicate securely over a public network. To improve the implementation efficiency of Tzeng??s conference-key agreement protocol, an efficient conference-key agreement protocol is proposed under the authenticated broadcast channel. First, the improved protocol is round-efficient, and relaxes...
Only a few ID-based ring signature schemes need a constant number of paring operations so far. In this paper, we present an ID-based ring signature (IDRS) scheme which needs only two pairing operations. Using the new IDRS scheme, we propose an ID-based ring signcryption (IDRSC) scheme. Our IDRS scheme and IDRSC scheme enjoy not only a low computational cost, but also a short ciphertext size. We give...
The idea of threshold cryptography is to distribute secret information and computation among multi parties in order to prevent a single point of failure or abuse. Certificateless public key cryptography(CL-PKC) does not require certificates to guarantee the authority of public keys while avoids the inherent key escrow of identity-based cryptography(IBC). In this paper, we propose a certificateless...
Signature, encryption and key exchange are some of the most important and foundational cryptographical tool. In most cases, they are all needed to provide different secure functions. There exist called authenticated encryption scheme and signcryption schemes that is the integration of signature and encryption. On the other hand, there are also some proposals on the efficient combination of signature...
There are lots of shortcomings in today' s NIC, and this results in the occupancy of lots of resources in CPU and Memory, greatly affects the responding time of computer and the transmission efficiency of data access, easily exposes the host to the attack and damage from the network and thus keeps the internal data in the host in great insecurity. Accordingly, this paper puts forward an intelligent...
Chinese electronic government (E-Government) has achieved great success in several years, to quicken the pace of building E-Government, the central government of China has programmed to establish four governance information resource databases in next five years, data center construction in the developed cities is becoming an important project for present China??s E-Government. Through investigation...
Semi-fragile watermarking which is robust to given operations and fragile to conscious operations, is a useful authentication technique for digital media. In this paper, a novel semi-fragile image watermarking algorithm that accepts gradient sharpening is proposed. In the proposed algorithm, based on the theory of gradient sharpening, the watermark is embedded in the space domain by modifying the...
Based on the simulation paradigm, Acs et al proposed a formal model tailored to the security analysis of on-demand distance vector routing protocols in MANET, and a routing protocol, called ARAN, was proven secure in the model. We indicate the improper manipulations such as mergence of the adjacent adversarial nodes, the improper definition of correct system state in the model, and the flaw in the...
Root trust transfers in turn to BIOS (Basic Input Output System), OS (Operating System) and eventually applications from TPM (Trust Platform Module) in Trusted Computing. Before every transfer of trust, integrity measurement module measures the integrity property of receiver and produces stored measurement log. A dynamic integrity measurement model is proposed to measure integrity during execution...
In complicated multi-objective optimization, it often happens that points in part region of Pareto front are easy to get, but in others are difficult. To obtain evenly distributed Pareto optimal solution, we construct dynamical crossover and mutation probability which can self-adaptively adjust the number of individuals engaged in crossover and mutation, combine with the fitness function constructed...
A deniable authentication can be used to provide secure negotiation on the Internet. Although many deniable authentication protocols have been proposed, most of them are vulnerable to various cryptanalytic attacks. Recently, a new deniable authentication protocol was proposed by Lee et al. However, Lee et al.??s protocol is not flawless yet due to its susceptibility to KCI attack. Then, based on ElGamal...
In this paper, the image encryption algorithm combining the image encryption based on S-boxes scrambling with error-correcting codes was developed. The Error-correcting code could effectively improve the security of image encryption algorithm based on S-boxes scrambling. Through analysis of image scrambling effects of a specific example of this algorithm, the safety and anti-shear capacity of it was...
A novel generation key scheme based on DNA is proposed. By using a key expansion matrix, the scheme improves the independence and the strict avalanche of the key. Although it increases computation amount because of using the matrix operation, the random number can be generated by the DNA sequence directly and the speed of the computation is greatly improved. Therefore, the new scheme has wide application...
Biometric cryptography is a technique using biometric features to encrypt the data, which can improve the security of the encrypted data and overcome the shortcomings of the traditional cryptography. This paper proposes a novel biometric cryptographic algorithm based on the most accurate biometric feature -- iris. In this algorithm, a 256-dimension textural feature vector is extracted from the preprocessed...
The popularity of Radio Frequency Identification (RFID) has raised the interest towards its security. Threat concerns towards individuals privacy slows down the adoption of the technology in the new innovative application areas. In this paper we will describe simple and efficient security method for lightweight RFID tags with support for ownership transfer. It based on solution described by Osaka...
Distribute architecture based on threshold scheme is adopted to provide certification service in Mobile Ad Hoc Networks, due to its characteristics such as no infrastructure, no center. There are some problems in those schemes such as fixed threshold value and conspiracy attack. A certificate signature scheme based on threshold group signature is proposed in this paper, comparing to existing distributed...
A mobile ad hoc network (MANET) is a collection of mobile nodes that forms a provisional network dynamically without the aid of any predetermined infrastructure. In particular, the route security is more important. In order to solve the problem several route discovery protocols have been proposed such as ARAN and SRP ect. But those protocols suffer from two problems: (1) difficult in operation, (2)...
Web applications can only be accessed through dedicated client systems called Web browsers. The behaviors of Web browser interactions influence the security, functionalities and navigation of Web applications. Modeling and testing Web applications should take them into account. In this paper, special care on Web browser interactions is paid and an approach to modeling on-the-fly navigation models...
User authentication is a mechanism that enables a user of a system to prove his identity and to have access to the system. Traditionally, there are three categories of authentication mechanisms based on what we know, what we are, and what we have. In this paper, we show some possible weaknesses in the third class of schemes and we propose a new user authentication scheme based on distance estimation...
For a class of real-time scheduling problems with the time constraints, both the time constraints and the security performance are considered in this paper. Firstly, a security-efficiency function is proposed, and a new security-driven task scheduling model is constructed based on the function. Secondly, a new selection operator is proposed, where some individuals not satisfying time constraints but...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.