The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In BEI 2009, Wang and Kim proposed a new fuzzy identity-based signature (FIBS) scheme and proved that it is existentially unforgeable under chosen message attack and fuzzy identity attack in the random oracle model if the discrete logarithm problem is computationally hard. In NSS 2009, Chen et al. proposed a fuzzy identity-based signature with dynamic threshold which is proven secure against unforgeability...
With the fast increases in the size of the scientific data, the visualization technique has been widely adopted to transform the information into an easy-to-understand representation. Since the security clearance and access rights of the end users may vary greatly in a scientic visualization system, the security mechanisms must be properly designed and deployed. In this paper, we present a key management...
Recently, many multireceiver identity-based encryption schemes have been proposed in the literature. However, none can protect the privacy of message receivers among these schemes. In this paper, we present an anonymous multireceiver identity-based encryption scheme where we adopt Lagrange interpolating polynomial mechanisms to cope with the above problem. Our scheme makes it impossible for an attacker...
This paper presents a recursive computational multi-secret sharing technique that hides k-2 secrets of size b each into n shares of a single secret S of size b, such that any k of the n shares suffice to recreate the secret S as well as all the hidden secrets. This may act as a steganographic channel to transmit hidden information or used for authentication and verification of shares and the secret...
This paper discusses a biometric encryption system using fuzzy vault scheme implemented on FPGA development board. Cryptographic algorithms are very secure overall but have a weak point in terms of the storage of the crypto keys. Biometric authentication systems have many exploitable weak points that can be used to compromise the system. Biometric encryption is a security scheme that combines strong...
As a fundamental requirement for providing security functionality in wireless sensor networks, key predistribution plays a central role in authentication and encryption. In the existing key predistribution scheme suitable for low power and resource sensor nodes, mutual authentication is not allowed and the security tolerance of network is low. In this paper, we propose a new key predistribution scheme...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.