The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud storage is a service provided by cloud service provider (CSP). More and more individuals and organizations accept the scheme and outsource their data to CSP seeking to reduce local storage burden. Since the outsourced files are no longer under the data owners' direct control and CSP is not trustworthy, it is necessary for data owners to check the integrity of their files outsourced to CSP. To...
In ubiquitous computing environment it is common that a user owns and uses multiple computing devices, but managing cryptographic keys in those devices is a complicated matter. If certificate-based cryptography (PKI) is used such that each device has independent certificate, then user has to be involved in multiple certificate issuing processes with certification authorities (CA) and has to keep multiple...
The Harn-Ren and Harn-Ren-Lin identity-based multisignature (IBMS) schemes are schemes derived from the RSA and GQ identity-based signature (IBS) schemes respectively. These IBMS schemes were claimed to be efficient based on two metrics - fixed length and constant verification time. This paper shows that both schemes suffer from similar flaws that allow adversaries to manipulate the list of signatories...
SEcure Neighbor Discovery (SEND) is proposed to counter IPv6 Neighbor Discovery Protocol (NDP) security threats. However, SEND is compute-intensive. Fulfilling Hash2 condition in Cryptographically Generated Addresses (CGA) is the main heavy part of SEND. Unfortunately, CGA computation cannot see significant speed improvement when it runs on multicore machine because CGA generation algorithm is sequential...
As the new computing service pattern of cloud computing develops rapidly, the security problem of cloud computing has become a hot research topic. Before the user passes important data or computing task to the cloud, the user of the cloud may want to verify the trusted status of the platform which actually carries out the computing task in the cloud. And the remote attestation mechanism in Trusted...
Computer notary system is an arbitrator or a notary public in the digital signature system, the process of arbitration, whether the signature is A communication sent to U, or U data are issued to B, after two and a signature encrypted password handling, you can ensure the security of communications. However, there is a signature of the arbitration serious problem: an intermediary can be replaced counterfeit...
Invoices are the voucher to reimburse for official expenses. However, fake paper invoices spread in our lives. The appearance of electronic invoices can solve the problem of fake invoices. Before the business purchases invoices from Inland Revenue, The Inland Revenue and the business identify the authenticities of each other and generate a temporary session key between them through Key Distribution...
Remote attestation of computing platforms, using trusted hardware, guarantees the integrity, and by this the trustworthiness of a host to remote parties. While classical binary attestation attests the configuration itself, property-based attestation (PBA) attests properties and thus offers higher privacy guarantees to the host and its user. Nonetheless, both techniques are free from any user authentication...
A novel and efficient WLAN fast authentication Protocol (FWAI) is proposed and compared with IEEE 802111i and WAPI about their security and performance. Then FWAI is analyzed with BAN-like logic on the security. Results show that FWAI achieves its security properties and there are no security vulnerabilities or redundancy in it.
In this paper, we propose a notion of contract signatures used in e-commerce applications. This scheme adopts digital multi-signature scheme in public-key cryptography to facilitate fair signature exchange over network. Security proof under the random oracle model of this modified signature scheme is include. This proposed solution allows two parties to produce and exchange two ambiguous signatures...
The identity (ID) based public key cryptosystem simplifies the key management and provides moderate security with comparison to the certificate based public key cryptosystem. Many signature schemes have been proposed using the identity of user. Proxy signature scheme enables the original signer to delegate his/her signing capability to a proxy signer. Bilinear pairings are useful in signature protocols...
To use the network services provided by multiple servers in mobile wireless network, a hash function and smart card based multi-server authentication scheme without verification tables and servers' public keys is proposed. The new protocol has many advantages, such as no encryption, signature, verification tables, timestamp, and public keys directory.
Introduced the credible computation's background and analyzed the TCG organization had Issued two authentication standard agreement: The trusted third party agreement and the direct anonymous authentication agreement, practice prove that the direct anonymous authentication agreement cannot be under the very good control in actual anonymous, this article proposed the improvement mentality in the original...
Because the PrivacyCA defined in TCG specification may leak user's privacy and trace his transactions, two PrivacyCA schemes with higher untraceability are proposed. The agents-based one provides higher untraceability by introducing agents and VK certificates to eliminate the linkage between EK and AIK. By adopting Partially Blind Signature algorithm in the generation of AIK triples, PBS-based one...
We introduce a non-interactive RSA time-lock puzzle scheme whose level of difficulty can be arbitrarily chosen by artificially enlarging the public exponent. Solving a puzzle for a message m means for Bob to encrypt m with Alice's public puzzle key by repeated modular squaring. The number of squarings to perform determines the puzzle complexity. This puzzle is non-parallelizable. Thus, the solution...
Harn and Lin proposed an authenticated key agreement without using one-way hash functions. It enables two communicating parties to establish four common session keys by sending two Diffie-Hellman public keys in a single round of message exchange. However, to resist the known key attack, only three common session keys can be used. Over the past years, all researches study to establish four common session...
A zero-knowledge proof of identity protocol is a special cryptographic algorithm for identity verification. The security of most of the zero-knowledge proof of identity protocols is based on complex mathematical algorithms and requires heavy computations for both parties involved, the proverb and the verifier. Thus, the two parties must depend on computing devices (computers) to perform these computations...
In a (t, n) threshold proxy signature scheme, the original signer can delegate his power of signature to n proxy signers in a proxy group, and only at least t proxy signers can sign any message on behalf of the original signer; One-time proxy signature is that the proxy signer only signs message for the original signer at most one time. These two kinds of signatures both control the power of the proxy...
Recently, Zhou et al. proposed a verifiably encrypted RSA (VE-RSA) signature scheme, which was used to convince that an encrypted message is a certain party's signature on a message while without revealing the signature. In this paper, we propose a new optimistic fair exchange protocol based on the verifiably encrypted RSA signature scheme. In our scheme, both parties can contact the TTP and settle...
Password authentication is a widely used entity authentication means nowadays. In password authentication, the server needs to manage a password file containing all user passwords. This poses a tremendous threat to the safety of the passwords: if the server is compromised, all passwords are immediately disclosed. A common countermeasure to this issue of single point of failure is to deploy multiple...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.