The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automated Trust Negotiation aims to securely identify the consensus between two sets of policies consisting of certificates, with minimal disclosure of policies to each other. The paper proposes a new scheme that allows both parties to learn whether or not, both parties agree to transfer a given target certificate to the requesting party. No policy is revealed after performance of the protocol. No...
Decentralized node admission is an essential and fundamental security service in mobile ad hoc networks (MANETs). It is needed to securely cope with dynamic membership and topology as well as to bootstrap other important security primitives (such as key management) and services (such as secure routing) without the assistance of any centralized trusted authority. An ideal admission technique must involve...
Consider several groups engaged in a single project. Group members of one group happens to communicate with other group members. How might the communication among the members be carried out securely? How to ensure that a group member of one group communicate securely with its own group and with other group members as well?. We predict that secure group key management schemes for simultaneous multiple...
Hiding a secret is needed in many situations. One might need to hide a password, an encryption key, a secret recipe, and etc. Information can be secured with encryption, but the need to secure the secret key used for such encryption is important too. Imagine you encrypt your important files with one secret key and if such a key is lost then all the important files will be inaccessible. Thus, secure...
A secure encryption protocol for mobile ad hoc networks is proposed based on cluster-based structure. In proposed scheme, we employ a one-way key chain and polynomial function as the basic means of constructing the encryption procedure in order to reduces the need for public key cryptography and shortage overhead. The proposed protocol avoids massive message exchanges for key setup that are sent during...
The privacy-CA solution (PCAS) is a protocol designed by the Trusted Computing Group (TCG) as an alternative to the Direct Anonymous Attestation scheme for anonymous authentication of Trusted Platform Module (TPM). The protocol has been specified in TPM Specification Version 1.2. In this paper we offer a rigorous security analysis of the protocol. We first design an appropriate security model that...
We propose a solution to the secure integer comparison problem by reducing it to the secure set membership problem on a set where the elements occur in consecutive order. Our protocol provides flexibility due to this reduction such that it can easily be modified to support more complex boolean functions other than the function evaluating the 'Less Than' predicate (LT). In the paper we show one such...
Consider a scenario where a server S shares a symmetric key kU with each user U. Building on a 2-party solution of Bohli et al., we describe an authenticated 3-party key establishment which remains secure if a computational Bilinear Diffie Hellman problem is hard or the server is uncorrupted. If the BDH assumption holds during a protocol execution, but is invalidated later, entity authentication and...
Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privacy laws (e.g. HIPAA) or policies. Privacy preserving data mining techniques have been developed to address this issue by providing mechanisms to mine the data while giving certain privacy guarantees. However, when these techniques...
Mobile relay stations (RSs) provide broadband wireless access (BWA) networks with additional mobility, which extends network coverage and advances dynamic networking and ubiquitous computing. However, there are many unresolved security vulnerabilities in the current IEEE 802.16 standard, such as BS/RS spoofing. Additional measures are needed to ensure that each component in the network is a trusted...
The focus of this paper is to design a dependable ID-based threshold broadcast encryption (TBE) scheme, by which a center can distribute keys over a network, so that a privileged subset of users can collaborate to jointly compute a specific key. Then a conventional secret-key cryptosystem, such as AES, can be used to encrypt the subsequent broadcast with the distributed key. Because a key distribution...
This paper introduces a new (t, n) secret sharing scheme for image encryption. The proposed method encrypts the secret image into two images as the same size of the original image, which one is the public image (called the encrypted image) and another is to be shared among n participants using a new secret sharing method based on the Shamir’s secret sharing. In the new secret sharing scheme, t (or...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.