The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Anonymous technology is an important identity protection technology, it can realize the privacy-preserving of the user. As two important cryptographic technologies, blind signature and ring signature can realize anonymity, thus, they play very important roles in realizing the anonymity of user's information. To fit with the requirement in real life, we propose a blind ring signature scheme by combining...
According to growth of the IT industry, the e-commerce is revitalized and the necessity of e-cash is being stressed. As several e-cash systems are developed and applied due to it, the systems are contributing to development of e-commerce. The present thesis is a research for providing the convenience, divisibility and transfer of e-cash and, etc, of commodity money to the e-cash in the same way. However,...
Before the deployment of any vehicular communication system, security and privacy issues have to be resolved. In this paper, for achieving secure and privacy preserving communications, an easily implementable PKI-based protocol is proposed. Security requirements for vehicular communications are defined and a detailed definition of the scheme, which uses shared asymmetric keys and PKI techniques to...
In this paper, we introduce a non-interactive secure protocol preserving privacy of the drivers for Inter-Vehicle Communication (IVC) networks. To protect the privacy among drivers, we propose to arrange vehicles into several groups. Vehicles in a group share the same public key, but each member can change his own set of public keys frequently, so the receiving vehicle cannot identify an individual...
We propose a novel scheme for selective distribution of content, encoded as documents, that preserves the privacy of the users to whom the documents are delivered and is based on an efficient and novel group key management scheme. Our document broadcasting approach is based on access control policies specifying which users can access which documents, or subdocuments. Based on such policies, a broadcast...
In this paper, we present a non-interactive authentication scheme providing privacy among drivers in vehicle-to-vehicle (V2V) communication networks. Where the drivers, who are members of V2V networks, are organized into groups. Each group has a shared public key between members. Additionally, each member has a private key provided by the Third Trusted Party (TTP). In our proposed scheme, we ensure...
Certificate-based cryptography and ID-based cryptography have been designed under different theoretical backgrounds and they have their own advantages and drawbacks, but there have been few works which try to provide them together in an efficient way. Chen et al. considered a hybrid scheme of public key infrastructure (PKI) and ID-based encryption (IBE), and also discussed various trust relationship...
Recently, Lee et al. proposed a delegation-based authentication protocol which provides secure and private roaming service for portable communication systems in global mobility networks. In this paper, we show that 1) Lee et al.'s protocol cannot protect users' privacy even though the protocol provides the user identity privacy; and 2) the unlinkability is required for delegation-based authentication...
To protect privacy in large systems, users should be able to authenticate against a central server without disclosing their identity to others. Private identification protocols based on public key cryptography are computationally expensive and cannot be implemented on small devices like RFID tags. Symmetric key protocols, on the other hand, provide only modest levels of privacy, but can be efficiently...
Refresh techniques can greatly enhance security and privacy of Class-1 Generation-2 RFID tags (Gen2 tags), without requiring any cryptographic capabilities from the tags. We propose a refresh-based RFID system and define a notion of privacy for the system. Privacy analysis investigates a novel security property of public-key encryption schemes, which plays the fundamental role to satisfy the defined...
In this paper, we propose a novel Radio Frequency Identification (RFID) system to preserve privacy and enhance security by using the public key cryptography method. In the proposed architecture, the access rights of the tags are controlled by a backend server. These improve security of the system and remedy privacy problems. We analyse security of the proposed system and demonstrate its robustness...
This paper present an alternative scheme to key escrow scheme which allows probabilistic law enforcement access to reveal the encrypted communications. Namely, key escrow authority can reveal the information between communication parties partially. Our scheme allows law enforcement access with probability p for each message. The scheme in this paper is basically the complemented scheme of Mihir Bellare...
Remote attestation presented in TCG specification is one of the significant ways to establish trust between the two endpoints. There are two categories of remote attestation: anonymous identity attestation of TPM and the security properties attestation of trust computing platform, and the verifier can verify both at the far endpoint. In order to simplify the attestations, we propose the hybrid attestation...
A mix network is a cryptographic construction for anonymous communications. In addition to anonymity, a reputable mix network first defined by Golle offers a reputation property: the mix-net can prove that every message it outputs corresponds to an input submitted by a user without revealing which input. This property can shield the mix-net from liability in the event that an output message is objectionable...
We propose a protocol that minimizes the cryptographic effort on an RFID tag without requiring a backend database record for each tag. The protocol allows a tag to identify itself only to its owner. When a product is sold, the tag ownership is changed in a secure way. Security is based on public key cryptography, which is becoming economically practical for RFID tags. With this protocol, tag owners...
Vehicular ad hoc network (VANET) is an emerging type of networks to allow vehicles on roads to communicate for driving safety. An vehicle can broadcast messages (e.g. accident information) to other vehicles. These messages may have impact on other vehicles as well as the traffic control system, so all messages must be signed and authenticated. On the other hand, privacy should be enforced while the...
Autonomic and opportunistic communications require specific routing algorithms, like replication-based algorithms or context-based forwarding. Privacy is a major concern for protocols which disseminate the context of their destination. In this paper, we focus on the privacy issue inherent to context-based protocols, in the framework of an original epidemic forwarding scheme, which uses context as...
In this paper, we describe a new primitive for error-tolerant searchable encryption and a security model for it. This generic scheme permits to make searches on encrypted data with only an approximation of some keyword. It enables to efficiently query secure databases in order to get the exact data with a close estimation of it. An application to biometric identification arises from this construction...
In this paper, we analyze and improve WIPR, an RFID identification scheme based on public key techniques with efficient hardware implementation. First we analyze the security and privacy features of WIPR. We show that a reduced version of WIPR is vulnerable to short padding attacks and WIPR needs a random number generator with certain properties to withstand reset attacks. We discuss countermeasures...
The direct anonymous attestation scheme was proposed by Brickell, Jan Camenisch, Liqun Chen and was adopted by the trusted computing group in its specifications for trusted computing platforms. In this paper, We propose a new direct anonymous scheme from the bilinear maps based on the decisional Diffie-Hellman assumption and q-SDH assumption. The length of private keys and signatures in our scheme...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.