The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most of the fair contract signing protocols published to date make use of a Trusted Third Party (TTP) to achieve fairness. In this paper, we have designed a fair contract signing protocol to support fair reselling of a DRM license without using a dedicated TTP. This protocol makes use of the concurrent signature (CS) and the existing license distribution infrastructure. By making use of the CS scheme,...
This paper presents a framework for privacy-preserving Gaussian Mixture Model computations. Specifically, we consider a scenario where a central service wants to learn the parameters of a Guassian Mixture Model from private data distributed among multiple parties with privacy constraints. In addition, the service also has security constraints where none of the data owners are allowed to learn the...
Model checking is widely used in the verification of security protocols. However, difficulties were often encountered when trying to formalize the complex underlying computations in security protocols. Some flaws of the security protocols, especially the ones that caused by the computations weakness, cannot be detected owing to the simple abstractions of its underlying computations. In this paper,...
In this paper, we point out the deficiencies of the existing DAA schemes on member revocation, inter-domain attestation and Rudolph's attack prevention and present a new scheme called Enhanced Privacy Inter-domain Anonymity Attestation based on Peer-to-Peer Networks. We add a new party called Trusted Auditor (TA) and construct a TA level above the existing DAA scheme. Analysis shows that the proposed...
The Internet has been population, which it was implement information technology, to every enterprize, also changed their contact mode of information flow style. Since public key conception was proposed, it had authentication function to secure while they are communication, and defense the data to leak based on stranger. In this article, we presented an improvement of generalized key agreement and...
The storage as a service paradigma has recently raised interest in the security community, where a few works have been proposed to check whether an outsourcer has tampered with the integrity of the outsourced data. In this paper, we assume that storage is outsourced in accordance to some integrity enforcing protocol. Under this assumption, we focus on a specific issue; that is, when the outsourcer...
Cloud Computing is the long dreamed vision of computing as a utility, where users can remotely store their data into the cloud so as to enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources. By data outsourcing, users can be relieved from the burden of local data storage and maintenance. However, the fact that users no longer have physical...
Recently, Huang and Cao proposed a novel and efficient unlinkable secret handshakes scheme with several security features including the affiliation-hiding property and the AKE-security. In this paper, we examine the security of the Huang-Cao scheme and show that the scheme fails to achieve two fundamental security requirements, the affiliation-hiding property and the AKE-security.
Electronic coupons have been accepted as a useful means in e-commerce. Multi-coupons are a special type of coupons, which are more efficient than single coupons in practice. So far, the application of multi-coupon systems is plagued by two main issues, i.e. how to provide efficient and flexible mechanism for redeeming, and how to implement the issuing protocol efficiently. In this paper, we give a...
Signcryption is a kind of cryptographic primitive which allows combining the signature and encryption into one scheme efficiently. In this paper we first improve the proxy key generation protocol enforced by Tasi et al and then propose a novel identity based proxy signcryption scheme based on the improved proxy key generation protocol and a identity based signcryption scheme proposed by Libert et...
When an agent resides in a community, the opinion of other community members concerning whether a particular individual is trustworthy or not influences the trust level of this agent. Hereby, the precise influence depends on the personality of the agent (e.g. whether he lets his opinion be influenced by others a lot). In this paper, a computational trust model which has dedicated parameters for agent...
We propose a network-coding based scheme to protect multiple bidirectional unicast connections against adversarial errors and failures in a network. The end nodes of the bidirectional connections are connected by a set of shared protection paths that provide the redundancy required for protection. Suppose that ne paths are corrupted by an omniscient, computationally unbounded adversary. Under our...
Secure multi-party computation (SMC) is dedicated to solve trust problems in cooperative computing with each participantpsilas private data. Privacy preserving computational geometry (PPCG) is a special area in SMC and is being widely used. This paper investigates the problem of judging whether a point is in a convex hull or not. We firstly present a secure protocol to determine the position of a...
Sensitive information has become a bottleneck of enterprises' collaboration, especially to competitive enterprises' collaboration. How to make collaborative decision under the protection of sensitive information is an important problem to advance enterprises' collaboration. To investigate the problem, a collaborative ordering of enterprises with differentiated products is modeled to get the optimal...
Managing trust is a key issue for a wide acceptance of P2P computing, particularly in critical areas such as e-commerce. Reputation based trust management has been identified in the literature as a viable solution to the problem. However, the mechanism faces the challenges of subjectively, experiential weighting referrals when aggregating recommendation information. Furthermore, not considering some...
Since publicly verifiable secret sharing(PVSS) is also one of the most important techniques, Stadler has referred that one application of PVSS is the design of electronic cash systems providing recoverable anonymity. However, there is not one electronic cash scheme based on PVSS. In this paper, we propose a divisible electronic cash scheme by using the PVSS. Payments made with such a scheme are (usually)...
A distributed system provides user with the ease of being accessible globally through the internet. Our image based authentication (IBA) system provides exactly that. The system is developed for academic use at Jaypee University of Information Technology (JUIT), provides a host of features that makes it user friendly and one of the most advanced IBA system till date. Secure environments protect their...
The E-cash schemes that are revocable anonymous with the help of trusted third party (TTP) cause additional costs and the level of anonymity is uncertain. Kulger et al adopted auditable tracing to control deanonymization without TTP, but the users have to audit the tracing frequently. A loss reportable e-cash scheme without TTP based on ECC is presented in this paper. In our scheme bank demands user...
This paper investigates loss of self-similarity (LoSS) detection performance using exact and asymptotic second order self-similarity (ESOSS and ASOSS) models. Previous works on LoSS detection have used ESOSS model with fixed sampling that we believe is insufficient to reveal LoSS detection efficiently. In this work, we study two variables known as sampling level and correlation lag in order to improve...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.