The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The previous electronic sealed-bid auction schemes usually have a common drawback, the third party (auction host) can conspire with a malicious bidder to leak all bidding prices before the opening stage. It results in the malicious bidder wining the auction with an optimal bidding price. This paper proposes a sealed-bid auction scheme without third party to get over this drawback. The proposed scheme...
This paper studies privacy issues related to epidemiological studies. Epidemiological studies need to preserve the privacy of subjects because they use personal information. Thus, privacy is preserved using a secure scalar product protocol based on a public-key cryptosystem and the secure function evaluation. However, the secure function evaluation has performance limitations in evaluating a product...
Wireless sensor network is an important part of the Internet of Things. Preservation of privacy and integrity in wireless sensor networks is extremely urgent and challenging. To address this problem, we propose in this paper an efficient and secure range query protocol in two-tiered wireless sensor networks introducing master nodes. Our proposal not only prevents adversaries from gaining sensitive...
Location-tracking is a major privacy problem, especially with high penetration of smart-phones and GPS-enabled devices around the world. In this paper, we propose a Hybrid and Social-aware Location-Privacy in Opportunistic mobile social networks (HSLPO), a collaborative and distributed obfuscation protocol that offers location-privacy k-anonymity. HSLPO discovers the users' own social network and...
Distributed imaging using sensor arrays has grown rapidly over past several years. Because image data is characterized by is high volume, an architecture of two tiered visual sensor network is proposed, where storage nodes gather image data from nearby sensors and process sink's query to transmit a time-specific image. However the importance of storage nodes is attractive to attackers. In this paper,...
The purpose of anonymous credentials is to bring more privacy to digital communication. By using anonymous credentials, users can anonymously prove the possession of personal attributes. The attributes can represent any personal information, including age, citizenship or birthplace. Unfortunately, existing credential schemes miss practical revocation features for revoking invalid, malicious or expired...
This paper presents an efficient approach to an existing batch verification system on Identity based group signature(IBGS)which can be applied to any Mobile ad hoc network device including Vehicle Ad hoc Networks (VANET). We propose an optimized way to batch signatures in order to get maximum throughput from a device in runtime environment. In addition, we minimize the number of pairing computations...
The blind signature scheme is a very useful protocol for a requester to obtain a signature on a message from a signer without revealing the linkage of the message content and the signature to the signer. After Chaum's scheme was first proposed in 1982, many extended protocols have been published and already used for many related applications. In 1995, the fair blind signature was first introduced...
The emerging growth of online social networks have opened new doors for various business applications such as promoting a new product across its customers. Besides this, friend recommendation is an important tool for recommending potential candidates as friends to users in order to enhance the development of the entire network structure. Existing friend recommendation methods utilize social network...
The concept of vehicle-to-grid (V2G) is that electric vehicles (EVs) communicate with the smart grid to sell demand response services by delivering electricity into the grid. The operation of V2G networks is based on continuously monitoring the status of individual EVs as well as a designed incentive scheme to attract sufficient participating EVs. However, the close monitoring might raise privacy...
Vehicular ad hoc networks (VANETs) have recently attract extensive attentions as a promising technology for improving traffic safety and efficiency. To make VANETs practical, security, privacy and efficiency are important issues. Anonymity preserving of group signature and lower overhead in verification of batch signature make these two kinds of signatures right tools to design VANET communication...
In this paper, we point out the deficiencies of the existing DAA schemes on member revocation, inter-domain attestation and Rudolph's attack prevention and present a new scheme called Enhanced Privacy Inter-domain Anonymity Attestation based on Peer-to-Peer Networks. We add a new party called Trusted Auditor (TA) and construct a TA level above the existing DAA scheme. Analysis shows that the proposed...
The growth of the Internet has prompted tremendous opportunities for cooperative computation, where people are jointly conducting computation tasks based on the private inputs they each supplies. These computations can occur between mutually untrusted parties, or even between competitors. For example, customers might send to a remote database queries that contain private information, two competing...
This paper present an alternative scheme to key escrow scheme which allows probabilistic law enforcement access to reveal the encrypted communications. Namely, key escrow authority can reveal the information between communication parties partially. Our scheme allows law enforcement access with probability p for each message. The scheme in this paper is basically the complemented scheme of Mihir Bellare...
Direct anonymous attestation (DAA) is adopted by the trusted platform module (TPM) of v1.2 standard described by the trusted computing group (TCG), aimed at settling protocols for trusted platform attestation and platform privacy protection. This paper gives a presentation of the new DAA protocol based on bilinear pairings and an analysis of its capacity to realize both attestation anonymity and detection...
Secure multi-party computation (SMC) is dedicated to solve trust problems in cooperative computing with each participantpsilas private data. Privacy preserving computational geometry (PPCG) is a special area in SMC and is being widely used. This paper investigates the problem of judging whether a point is in a convex hull or not. We firstly present a secure protocol to determine the position of a...
Many privacy-protecting electronic payment systems have been proposed to realize the revocable anonymity among users. In this paper, by organizing all users into a group, we present an anonymity revocable electronic prosecution report system. The report system is efficient and the user's privacy will not be compromised in normal cases. However, when defamation was detected, the anonymity can be removed...
In this paper, we describe a proxy signature scheme where a signer can delegate his signing right to a party who can then sign on behave of the original signer to generate a proxy signature. Our proxy signature scheme possesses the features of deniability and anonymity. It allows the signer to send messages to another while the latter can not prove to a third party the fact of communication and insures...
A scheme that exploits the broadcast nature of the wireless communication in order to achieve multicast content delivery is presented in this paper. As opposed to broadcasting, this method enables the clients to determine on-line the delivered content, and thus preserves the advantages of an individual service. On the other hand, a multicast content delivery is much more efficient than a unicast content...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.