The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When data owners store their data on cloud servers, they may want to define the access requirements themselves, where attribute-based authentication (ABA) can be a good choice for the solution. In this paper, we propose a traceable hierarchical ABA (HABA) solution which fits two situations in the cloud. The first situation is when cloud users are organized in groups of a hierarchical structure and...
This paper gives a theoretical background to dynamic generation of primitive polynomials, their usage in many fields including cryptography for a mobile communication systems. Presented polynomials and their generation over a Galois field is discussed. Additionally, the basic properties and arithmetic methods over finite fields of characteristic 3 are presented. The main objective of this paper is...
Consider a client who wants to outsource storage and computation of sensitive information to a not fully trusted third party. Secure computation algorithms like homomorphic encryption are typically used to solve this issue, but introduce overhead through randomization and thus ciphertext expansion. Furthermore, encryption may be infeasible for small, resource constrained devices.
In this article we describe two alternative order-preserving encryption schemes. First scheme is based on arithmetic coding and the second scheme uses sequence of matrices for data encrypting. In the beginning of this paper we briefly describe previous related work published in recent time. Then we propose alternative variants of OPE and consider them in details. We examine drawbacks of these schemes...
The large scale use of multimedia data like compressed audio necessitates the need for its secure distribution without affecting the quality. In this paper a more secure and less complex method is proposed where a part of the MP3 bit stream is encrypted with multiple keys generated from a single seed using a modified key stream generator based on LFSR and Division Modulo Circuit. The throughput of...
An improved stream cipher based on the linear feedback shift register is set up by adding disturbance on to the initial states. The key advantage of the new algorithm over the already proposed ones is that the characters of the ciphertext corresponding to the same characters in the plaintext are distinct. The new algorithm also keeps all other advantages. Therefore, for the adversary, it is more difficult...
With the current rapid increase of cloud computing, enterprises outsource their sensitive data for sharing in a cloud. The key problems of this approach include establishing access control for the encrypted data, and revoking the access rights from users when they are no longer authorized to access the encrypted data on cloud servers. This paper aims to solve these problems. Firstly, based on the...
In BEI 2009, Wang and Kim proposed a new fuzzy identity-based signature (FIBS) scheme and proved that it is existentially unforgeable under chosen message attack and fuzzy identity attack in the random oracle model if the discrete logarithm problem is computationally hard. In NSS 2009, Chen et al. proposed a fuzzy identity-based signature with dynamic threshold which is proven secure against unforgeability...
This paper presents a hardware design for a scalable, high throughput, configurable LFSR. High throughput is achieved by producing L consecutive outputs per clock cycle with a clock cycle period that, for practical cases, increases only logarithmically with the block size L and the length of the register N. Flexibility is ensured by offering full reconfigurability of the generator polynomial within...
Enocoro is a family of stream ciphers proposed by Watanabe et al. in 2007. It consists of two algorithms called Enocoro-80 and Enocoro-128v1.1, whose key lengths are 80 bits and 128 bits respectively. In this paper, we show that Enocoro-128v1.1 is vulnerable against the related-key attack in which we assume a stronger attacker than one in the related-key differential attack. The attack is applicable...
Consider a scenario where a server S shares a symmetric key kU with each user U. Building on a 2-party solution of Bohli et al., we describe an authenticated 3-party key establishment which remains secure if a computational Bilinear Diffie Hellman problem is hard or the server is uncorrupted. If the BDH assumption holds during a protocol execution, but is invalidated later, entity authentication and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.