474 results on '"Threshold cryptosystem"'
Search Results
2. Secure Multi-Party Computation of Graphs' Intersection and Union under the Malicious Model.
- Author
-
Liu, Xin, Tu, Xiao-Fen, Luo, Dan, Xu, Gang, Xiong, Neal N., and Chen, Xiu-Bo
- Subjects
GRAPH algorithms ,INFORMATION technology security ,GEOMETRY ,PUBLIC key cryptography ,INTERSECTION graph theory ,SOFT sets - Abstract
In recent years, with the development of information security, secure multi-party computation has gradually become a research hotspot in the field of privacy protection. The intersection and union computation of graphs is an important branch of secure computing geometry. At present, the intersection and union of graphs are almost designed under the semi-honest model, and few solutions are proposed under the malicious model. However, the solution under the malicious model is more secure and has important theoretical and practical significance. In this paper, the possible malicious behaviors of computing the intersection and union of graphs are analyzed. Using the Lifted-ElGamal threshold cryptosystem and zero-knowledge proof method, the secure multi-party computation algorithm of graphs' intersection and union under the malicious model is designed. The real/ideal model paradigm is used to prove the security of the algorithm, the efficiency of the algorithm is analyzed in detail, and the feasibility is verified through experiment. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
3. Blockchain-Based Threshold Electronic Voting System
- Author
-
Gong, Borui, Lu, Xingye, Fat, Lau Wang, Au, Man Ho, Barbosa, Simone Diniz Junqueira, Editorial Board Member, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Kotenko, Igor, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Meng, Weizhi, editor, and Furnell, Steven, editor
- Published
- 2019
- Full Text
- View/download PDF
4. HIERARCHICAL AND DYNAMIC THRESHOLD PAILLIER CRYPTOSYSTEM WITHOUT TRUSTED DEALER.
- Author
-
Klinger, Andreas, Wüller, Stefan, Traverso, Giulia, and Meyer, Ulrike
- Subjects
CRYPTOSYSTEMS ,MALWARE ,INTEGERS ,STOCKHOLDERS ,INFORMATION theory - Abstract
Copyright of Rad HAZU: Matematicke Znanosti is the property of Croatian Academy of Sciences & Arts (HAZU) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2021
- Full Text
- View/download PDF
5. Privacy-Preserving Aggregation for Federated Learning-Based Navigation in Vehicular Fog
- Author
-
Qinglei Kong, Shuguang Cui, Rongxing Lu, Xiaohong Wang, Ping Zhang, Beibei Li, and Feng Yin
- Subjects
Security analysis ,Skip list ,Computer science ,business.industry ,Distributed computing ,020208 electrical & electronic engineering ,Homomorphic encryption ,Cryptography ,02 engineering and technology ,GPS signals ,Computer Science Applications ,Control and Systems Engineering ,Server ,0202 electrical engineering, electronic engineering, information engineering ,Global Positioning System ,Electrical and Electronic Engineering ,business ,Threshold cryptosystem ,Information Systems - Abstract
Federated learning-based automotive navigation has recently received considerable attention, as it can potentially address the issue of weak global positioning system (GPS) signals under severe blockages, such as in downtowns and tunnels. Specifically, the data-driven navigation framework combines the position estimation offered by the high-sampling inertial measurement units and the position calibration provided by the low-sampling GPS signals. Despite its promise, the privacy preservation and flexibility of the participating users in the federated learning process are still problematic. To address these challenges, in this article, we propose an efficient, flexible, and privacy-preserving model aggregation scheme under a federated learning-based navigation framework named FedLoc . Specifically, our proposed scheme efficiently protects the locally trained model updates, flexibly supports the fluctuation of participants, and is robust against unregistered malicious users by exploiting a homomorphic threshold cryptosystem, together with the bounded Laplace mechanism and the skip list. We perform a detailed security analysis to demonstrate the security properties in terms of privacy preservation and dishonest user detection. In addition, we evaluate and compare the computational efficiency with two traditional schemes, and the simulation results show that our scheme greatly improves the computational efficiency during participant fluctuation. To validate the effectiveness of our scheme, we also show that only part of the model update is excluded from aggregation in the case of a dishonest user.
- Published
- 2021
6. Distributed authentication framework for Hadoop based bigdata environment
- Author
-
N. Jeyanthi and M. Hena
- Subjects
Authentication ,General Computer Science ,Computer science ,computer.internet_protocol ,business.industry ,Distributed computing ,Data security ,Mutual authentication ,Encryption ,Cryptosystem ,Kerberos ,business ,computer ,Threshold cryptosystem ,ElGamal encryption - Abstract
Big data, the upcoming technology in the field of computing, refers to a large complex dataset. It deals with large complex datasets and yields great valued information when analysed properly. Data Security has become the greatest challenge in the minds of cyber experts and researchers in this scenario. Apache Hadoop frameworks that let distributed processing of these large datasets rely on Kerberos Authentication for mutual authentication and verification. The protocol comes with inherent challenges like Single point of failure, Dictionary Attacks, Replay Attacks, and Time Synchronization problems. This paper puts forward a one-off approach based on recent technologies like Blockchain Networks, Digital Signatures, and Elliptic ElGamal and Threshold Cryptosystem. The proposed scheme aims to mainly deal with the Single Point of Failure problem. Riverbed Modeller (AE) simulation is performed to do the comparative study of the proposed scheme with existing systems that use traditional encryption standards like RSA cryptosystems. Analysis of the simulation results proves that the proposed scheme is more efficient in terms of time and memory without compromising the level of security offered. The response time, network delay and traffic rates of the proposed system are compared with the existing RSA based system and the results strengthen the claims of this work. Lastly, the results from comparative analysis of security features and computational time cost indicate that the proposed method heightens the security level offered for big data systems with a nominal effect on performance.
- Published
- 2021
7. A Verifiable Multi-Authority E-Voting Scheme for Real World Environment
- Author
-
Taghavi, T., Kahani, M., Bafghi, A.G., and Elleithy, Khaled, editor
- Published
- 2007
- Full Text
- View/download PDF
8. Hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer
- Author
-
Giulia Traverso, Andreas Klinger, Ulrike Meyer, and Stefan Wüller
- Subjects
TheoryofComputation_MISCELLANEOUS ,Theoretical computer science ,Computer science ,General Mathematics ,Homomorphic cryptosystem ,threshold cryptosystem ,hierarchical secret sharing ,dynamic secret sharing ,Paillier ,SMPC ,Birkhoff interpolation ,Threshold cryptosystem ,Paillier cryptosystem - Abstract
We propose the first hierarchical and dynamic threshold Paillier cryptosystem without trusted dealer and prove its security in the malicious adversary model. The new cryptosystem is fully distributed, i. e., public and private key generation is performed without a trusted dealer. The private key is shared with a hierarchical and dynamic secret sharing scheme over the integers. In such a scheme not only the amount of shareholders, but also their levels in the hierarchy decide whether or not they can reconstruct the secret and new shareholders can be added or removed without reconstruction of the secret.
- Published
- 2021
9. Anonymous Statistical Survey of Attributes
- Author
-
Nakanishi, Toru, Sugiyama, Yuji, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Varadharajan, Vijay, editor, and Mu, Yi, editor
- Published
- 2001
- Full Text
- View/download PDF
10. Threshold attribute-based signcryption and its application to authenticated key agreement.
- Author
-
Zheng, Haibin, Qin, Jing, Hu, Jiankun, and Wu, Qianhong
- Subjects
PUBLIC key cryptography ,DIGITAL signatures ,DATA encryption ,COMPUTER access control ,KEY agreement protocols (Computer network protocols) - Abstract
Signcryption is a public key cryptosystem that achieves the functions of digital signature and public key encryption simultaneously. It significantly reduces the cost of traditional signature-then-encryption approach. Although a large body of signcryption schemes have been proposed, few works have been done on attribute-based signcryption (ABSC), which simultaneously achieves the functionalities of attribute-based encryption and attribute-based signature, two important cryptographic primitives proposed to enforce fine-grained access control and user authentication in cloud computing applications. In this paper, we present a threshold ABSC scheme. The scheme is proven secure under the well-established Decisional Bilinear Diffie-Hellman and the standard Computational Diffie-Hellman assumptions in the standard model. Compared with the state of the ABSC art, our scheme has comparable efficiency without relying on any random oracle. Furthermore, we construct an authenticated key agreement protocol based on this threshold attribute-based signcryption from the point of improving the security of cloud computing. Copyright © 2016 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
11. A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage.
- Author
-
Chen, Zhenhua, Li, Shundong, Huang, Qiong, Wang, Yilei, and Zhou, Sufang
- Subjects
DATA encryption ,DATA warehousing ,CLOUD storage ,CRYPTOSYSTEMS ,CRYPTOGRAPHY ,COMPUTER software - Abstract
For fine-grained data access control in cloud computing, for the first time, we introduce a new concept called restricted proxy re-encryption with keyword search, which combines the function of proxy re-encryption with keyword search and that of threshold cryptosystem. To demonstrate this concept, we present the formal syntax for restricted proxy re-encryption with keyword search, the security model, and a concrete construction. In our scheme, we take advantage of the techniques of threshold cryptosystem to restrict the capacity of the proxy cloud server, and in the meantime, we let the proxy cloud server can only re-encrypt the data containing a specified keyword, which matches the trapdoor from delegatee to provide an accurate access control for users. While in this process, the proxy cloud server learns nothing about the contents of data and keyword. Our scheme is proved to be semantically secure under the modified bilinear Diffie-Hellman assumption and the q-decisional bilinear Diffie-Hellman inversion assumption in the random oracle model. Finally, we apply the techniques in our scheme to some practical problems. Copyright © 2016 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
12. On the existence of provably secure cloud computing systems.
- Author
-
Varnovsky, N., Zakharov, V., and Shokurov, A.
- Abstract
We study a formal model of cloud computing systems with auxiliary cryptoservers. Assuming an existence of a secure threshold somewhat homomorphic public key cryptosystem we show how to build a cloud computing system secure in this model. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
13. Threshold Cryptosystem Based on Factoring and Discrete Logarithm Problems.
- Author
-
Adli Mohamad, Mohd Saiful and Ismail, Eddie Shahril
- Subjects
- *
CRYPTOSYSTEMS , *FACTORIZATION , *LOGARITHMS , *CRYPTOGRAPHY , *NUMBER theory , *DATA encryption , *CYBERTERRORISM - Abstract
Recently, the development of cryptosystem based on two problems has increased, since it is proved that the cryptosystem based on two problems is more secure than the cryptosystem based on single problem. Meanwhile, the concept of group-oriented cryptography, known as threshold cryptography, gave a new dimension in development of cryptosystems. In this paper we propose a new threshold cryptosystem based on two number theoretical problems; factoring and discrete logarithms. Other than the scheme, we also show that our cryptosystem is secure against some possible attack and requires reasonable time in encryption and decryption phases. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
14. Multi-document threshold signcryption scheme.
- Author
-
Tsai, Chien-Hua and Su, Pin-Chang
- Subjects
DIGITAL signatures ,CRYPTOGRAPHY ,DATA encryption ,KNAPSACK problems ,INFORMATION technology security ,ELLIPTIC curve cryptography - Abstract
Without proper and well-managed encryption, digital communications interception is technically easy to tap over public networks, and it causes unauthorized disclosure of sensitive information and irreparable harm to individuals as well as organizations. To ensure that digital information remains complete, accessible and secure at all times, it needs to be reliably processed on security measures at both the sending and receiving ends. Signcryption like other aspects of a cryptographic system simultaneously provides the characteristics of both digital signature and encryption and can fulfill the basic security requirements of information confidentiality, integrity and availability in transmission. In this paper, we introduce a threshold signcryption scheme based on elliptic curve cryptography to combine the dynamic knapsack cryptosystem technique with the Chinese remainder theorem and achieve a more robust security cryptosystem for multi-document transmission. With the proposed composition scheme of threshold signcryption function, participants not only can employ the avalanche effect of unsystematic properties founded on the elliptic curve cryptography's point addition to chaotically generate pre-shared secure cipher keys against the counterfeiting or potential information leakage problems but also apply the advantages of a smaller key size and its high strength of security under the elliptic curve discrete logarithm problem assumption to carry out digital communications, which can be fast and reliably transmitted over a public channel. Copyright © 2014 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
15. Privacy-preserving emergency access control for personal health records.
- Author
-
Phuwanai Thummavet and Sangsuree Vasupongayya
- Subjects
- *
EMERGENCY management , *MEDICAL records , *MEDICAL care , *ALTERNATIVE medicine , *ACCESS control of records , *SAFETY - Abstract
Recently, a flexible scheme for handling personal health records (PHRs) in emergency situations has been proposed. Under such a scheme, each PHR is classified as secure, restricted, or exclusive information. Secure PHRs are immediately available to the emergency response unit (ERU) staff. Restricted PHRs require additional approvals from a set of authorised people who are pre-selected by the PHR owner. Exclusive PHRs are only accessible by the owner. Previous work assumed that all ERU staff is trustworthy. To be practical, this work eliminates such an assumption. Several mechanisms are applied to ensure the usability and security of the newly proposed scheme. For example, an accessrequest authentication mechanism is applied to enhance the trustworthiness of the requests that are invoked by the ERU staff. Moreover, a transaction auditing mechanism is applied to provide a non-repudiation feature. This paper discusses the usability and security issues of the proposed scheme in practice and suggests how to classify a PHR considering the above-mentioned privacy levels. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
16. A novel personal health record system for handling emergency situations.
- Author
-
Thummavet, P. and Vasupongayya, S.
- Abstract
Personal health record (PHR) becomes a popular research topic nowadays. Many research works have proposed several concepts in managing and organizing a PHR. However, there are several uncertain issues left such as the role of a PHR in emergency situations. In this paper, a solution to handle a PHR information management in emergency situations is proposed. Because a PHR is controlled by its owner, the critical challenge in handling the PHR in emergency situations is how emergency staffs can access PHR information, even when the PHR owner is unable to give his/her consent. The proposed scheme allows each PHR to be classified into several categories. Each category presents a different restriction. And, the emergency staffs can access each category according to the policy defined by the PHR owner. The threshold cryptosystem is adapted in this work to allow the selected set of PHR-owner-delegates to grant permission to the emergency staffs when the PHR owner is unconscious. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
17. Collaborative Admission Control Scheme for Group-Based P2P Contents Sharing Systems.
- Author
-
Kadowaki, Kazuma and Fujita, Satoshi
- Abstract
In this paper, we proposed a user management scheme for Peer-to-Peer (P2P) contents sharing systems. The proposed scheme assumes the existence of peer groups which provide sensitive, confidential contents to the group members, and controls the membership through the collaboration among group members. As the key technique, we use the delegation of the task of qualification to few selected group members, and a voting mechanism based on the (n, t)-threshold cryptosystem. We implemented a prototype of the proposed scheme using JXTA framework, and evaluated the performance experimentally. The experimental result indicates that although the time required for the admission control is proportional to the group size and the threshold used in the threshold cryptosystem, we can significantly reduce it by executing it in parallel. We also demonstrate the availability of the scheme by applying it to the P2P live video streaming system. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
18. A new construction of threshold cryptosystems based on RSA.
- Author
-
Zhang, Chenchen, Luo, Yuan, and Xue, Guangtao
- Subjects
- *
CRYPTOGRAPHY , *RSA algorithm , *DATA encryption , *CHINESE remainder theorem , *ACCESS control , *THRESHOLD signatures - Abstract
There have been many ways to construct a threshold cryptosystem. Most often they are constructed by combining original public encryption schemes with some methods such as Shamir’s secret sharing. In this paper a new threshold cryptosystem based on RSA is presented, which is constructed by several RSA instances with chosen moduli and private keys. In fact, by computing the common private keys of some individual RSA instances and modifying the moduli, we combine those RSA instances and get a new threshold cryptosystem (hereinafter called combined RSA for simplification). First, it is proved that this system has similar security properties to the CRT-based (Chinese remainder theorem) threshold RSA while being convenient to implement, i.e., it only needs modular multiplication once to encrypt or decrypt respectively. Although the new system has the same security strength as the CRT-based RSA theoretically, it will provide fewer opportunities for adversaries in practical applications as there is only one step for encryption or decryption. Second, for complexity, as plain RSA is efficient, the combined RSA is also practical in computation. Therefore, if a plain RSA user wants to develop threshold decryption or threshold signature more conveniently and more securely, the combined RSA would be suitable. Finally, an application of the combined RSA is provided in this paper to realize distributed data access control with collusion-resistance. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
19. New constructions of dynamic threshold cryptosystem.
- Author
-
Long, Yu, Chen, Ke-fei, and Mao, Xian-ping
- Abstract
This study deals with the dynamic property of threshold cryptosystem. A dynamic threshold cryptosystem allows the sender to choose the authorized decryption group and the threshold value for each message dynamically. We first introduce an identity based dynamic threshold cryptosystem, and then use the Canetti-Halevi-Katz (CHK) transformation to transform it into a fully secure system in the traditional public key setting. Finally, the elegant dual system encryption technique is applied to constructing a fully secure dynamic threshold cryptosystem with adaptive security. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
20. Provable Security for Public Key Cryptosystems
- Author
-
Syed Taqi Ali
- Subjects
Provable security ,Computer science ,Public key cryptosystem ,Cryptosystem ,Hybrid cryptosystem ,Computer security ,computer.software_genre ,Information-theoretic security ,computer ,Threshold cryptosystem ,Goldwasser–Micali cryptosystem ,Benaloh cryptosystem - Abstract
In the early years after the invention of public key cryptography by Diffie and Hellman in 1976, the design and evaluation of public key cryptosystems has been done merely in ad-hoc manner based on trial and error. The public key cryptosystem said to be secure as long as there is no successful cryptanalytic attack on it. But due to various successful attacks on the cryptosystems after development, the cryptographic community understood that this ad-hoc approach might not be good enough. The paradigm of provable security is an attempt to get rid of ad hoc design. The goals of provable security are to define appropriate models of security on the one hand, and to develop cryptographic designs that can be proven to be secure within the defined models on the other. There are two general approaches for structuring the security proof. One is reductionist approach and other is game-based approach. In these approaches, the security proofs reduce a well known problem (such as discrete logarithm, RSA) to an attack against a proposed cryptosystem. With this approach, the security of public key cryptosystem can be proved formally under the various models viz. random oracle model, generic group model and standard model. In this chapter, we will briefly explain these approaches along with the security proofs of well known public key cryptosystems under the appropriate model.
- Published
- 2020
21. Secure rational numbers equivalence test based on threshold cryptosystem with rational numbers
- Author
-
Bo Yang, Jinguang Chen, Wei Wang, Tao Xue, and Linming Gong
- Subjects
TheoryofComputation_MISCELLANEOUS ,Discrete mathematics ,Scheme (programming language) ,021110 strategic, defence & security studies ,Rational number ,Information Systems and Management ,Ideal (set theory) ,Computer science ,0211 other engineering and technologies ,Plaintext ,02 engineering and technology ,Construct (python library) ,Computer Science Applications ,Theoretical Computer Science ,Artificial Intelligence ,Control and Systems Engineering ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Alice (programming language) ,Threshold cryptosystem ,Protocol (object-oriented programming) ,computer ,Software ,computer.programming_language - Abstract
In this study, we consider an equivalence test on rational numbers in a scenario with K + 2 distributed parties, Alice, Bob, P 1 , P 2 , … , P K , where Alice has a private rational number xa, Bob has a private rational number xb, and party Pi has a secret si, where i ∈ { 1 , 2 , … , K } , K ≥ 2. The parties want to cooperatively detect whether x a = x b without revealing any information about their secrets. This problem has many applications in online collaboration, such as e-voting, which requires public verifiability. First, we develop a provably secure threshold cryptosystem for rational numbers. Next, based on the proposed threshold scheme, we construct a distributed plaintext equivalence test protocol in an honest majority environment. We prove that the proposed protocol is secure and robust in the standard (ideal/real) model.
- Published
- 2018
22. A Threshold Cryptosystem in Secure Cloud Computations
- Author
-
N. P. Varnovskij, S. A. Martishin, M. V. Khrapchenko, and A. V. Shokurov
- Subjects
гомоморфные вычисления ,Computer science ,business.industry ,Homomorphic encryption ,Cryptography ,Cloud computing ,Information security ,Cryptographic protocol ,Computer security ,computer.software_genre ,облачные вычисления ,lcsh:QA75.5-76.95 ,Information protection policy ,вычисления над зашифрованными данными ,Server ,защита информации ,General Earth and Planetary Sciences ,lcsh:Electronic computers. Computer science ,business ,computer ,Threshold cryptosystem ,General Environmental Science - Abstract
Information security in cloud computing technology is actively investigated by the world scientific community. They uses the internet and the central remote servers to provide and maintain data as well as applications. This users' data files can be accessed and manipulated by any other users. So the problem of secure data storage and computation is actual. The modern studies in this field shows that the indicated problem is much more complex than any of the other information security problems, which are solved by well-known cryptographic methods. So, for example M. van Dijk and A. Juels in the paper "On the impossibility of cryptography alone for privacy-preserving cloud computing" described a mathematical model of the organization of cloud computing and proved that in the case of two users information protection is impossible. This result refutes the well-established point of view that the recently proposed by C. Gentry construction for fully homomorphic encryption solves at least theoretically, all the problems of information security in cloud computing. We offer an alternative model of cloud computing, in which the specified negative result does not holds. It differs from the above in the point that each subject interested in privacy, creates his own crypto server. From the point of view of users these cryptoservers are the part of the cloud. The methods of information protection, using threshold cryptosystem in this new model are investigated.
- Published
- 2018
23. Dynamic threshold ECDSA signature and application to asset custody in blockchain
- Author
-
Huili Wang, Wenping Ma, Haibin Zheng, Fuyang Deng, and Qianhong Wu
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Elliptic Curve Digital Signature Algorithm ,Cryptography ,Asset (computer security) ,Computer security ,computer.software_genre ,Distributed key generation ,Collusion ,Systems architecture ,Safety, Risk, Reliability and Quality ,business ,Database transaction ,Threshold cryptosystem ,computer ,Software - Abstract
The centralized exchange is one of the hottest DeFi applications based on blockchain transaction systems. However, depositing user assets to the exchanges brings the security risks of assets misappropriation. Threshold cryptosystem can effectively solve the drawbacks of centralized hosting by assigning the assets authorization to multiple trustees, but the collusion attack generated by malicious trustees is still unavoidable. In this paper, we propose a new dynamic threshold ECDSA signature scheme which is compatible with current blockchain transaction system. It realizes distributed custody of assets in exchanges, and further achieves a dynamic mechanism allowing user join and drop out to resist collusion attacks. Specifically, we formalize the definition of this system architecture and give its construction based on basic cryptography modules such as ECDSA signature, distributed key generation, and distributed computation. Analysis and experiment results show that our scheme holds protocol security and is more efficient than other threshold ECDSA signature schemes when threshold is less than 200, which makes it applicable to the assets custody scenarios of exchanges.
- Published
- 2021
24. Anonymous RFID Authentication for Cloud Services.
- Author
-
Bingöl, Muhammed Ali, Birinci, Fatih, Kardaş, Süleyman, and Kiraz, Mehmet Sabır
- Subjects
- *
RADIO frequency identification systems , *CLOUD computing , *COMPUTER access control , *COMPUTER security , *RELIABILITY in engineering , *ELECTRONIC commerce , *MOBILE agent systems - Abstract
Cloud computing is one of the fastest growing segments of IT industry since the users' commitments for investment and operations are minimized, and costs are in direct relation to usage and demand. In general, cloud services are required to authenticate the user and most of the practical cloud services do not provide anonymity of the users. Namely, cloud provider can track the users easily, so privacy and authenticity are two critical aspects of security. Anonymous authentication is a technique enabling users to prove that they have privilege without disclosing real identities. This type of authentication can be useful especially in scenarios where it is sufficient to ensure the server that the claiming parties are indeed registered. Some motivating applications in the cloud for an anonymous authentication protocol are E-commerce, E-voting, E-library, E-cash and mobile agent applications. Many existing anonymous authentication protocols assume absolute trust to the cloud provider in which all private keys are stored. This trust may result in serious security and privacy issues in case of private key leakage from the cloud provider. In this paper, we propose forward secure anonymous and mutual authentication protocols using RFID technology for cloud services. These protocols avoid the trustworthiness to the cloud provider. Meaning that, even if the private keys are obtained from the corrupted tags or from the server owners of these tags cannot be traced from the past authentication actions. In fact, anonymity of the users will still be ensured even the private keys of tags are compromised. [ABSTRACT FROM AUTHOR]
- Published
- 2012
25. An Computation-Efficient Generalized Group-Oriented Cryptosystem.
- Author
-
Ting-Yi Chang
- Subjects
- *
COMPUTATIONAL complexity , *ELLIPTIC curves , *BANDWIDTHS , *DATA encryption , *PERFORMANCE evaluation - Abstract
A Group-Oriented Cryptosystem (GOC) allows a sender to encrypt a message sent to a group of users so only the specified sets of users in that group can cooperatively decrypt the message. Recently, Li et al. pointed out unauthorized sets in the receiving group can recover the encrypted messages in Yang et al.'s GOC; and they further repaired this security flaw. However, the improved GOC contains inexact security analysis. Further, conversion of the scheme into a threshold cryptosystem results in inefficiency. This study enhances Li et al.'s GOC, both in that it achieves the requirements of GOC but also that it can be efficiently converted into a threshold cryptosystem. Under the decisional Diffie-Hellman problem assumption, the proposed scheme is demonstrated to be provably secure against chosen plaintext attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
26. Robust RSA distributed signatures for large-scale long-lived ad hoc networks.
- Author
-
Zanin, Giorgio, Di Pietro, Roberto, and Mancini, Luigi V.
- Subjects
- *
THRESHOLD logic , *DIGITAL signatures , *PEER-to-peer architecture (Computer networks) , *WIRELESS communications , *UBIQUITOUS computing , *COMPUTER network security - Abstract
Ad hoc environments are subject to tight security and architectural constraints, which call for distributed, adaptive, robust and efficient solutions. In this paper we propose a distributed signature protocol for large-scale long-lived ad hoc networks. The proposed protocol is based on RSA and a new (t,t)-secret sharing scheme. The nodes of the network are uniformly partitioned into t classes, and the nodes belonging to the same class are provided with the same share. Any t nodes, belonging to different classes, can collectively issue a signature, without any interaction. The scheme is at least as secure as any (t,n)-threshold scheme, i.e., an adversary can neither forge a signature nor disrupt the computation, unless it has compromised at least t nodes, belonging to different classes. Moreover, an attempt to disrupt the distributed service, by providing a fake signature share, would reveal the cheating node. Further, it is possible to easily increase the level of security, by shifting from a (t,t) to a (t+k,t+k) scheme, for a reasonable choice of parameter k, involving just a fraction of the nodes, so that the scheme is adaptive to the level of threat that the ad hoc network is subject to. Finally, the distributed signature protocol is efficient: the number of messages sent and received for generating a signature, as well as to increase the level of security, is small and both computations and memory required are small as well. [ABSTRACT FROM AUTHOR]
- Published
- 2007
- Full Text
- View/download PDF
27. Secure Audio Cryptosystem Using Hashed Image LSB watermarking and Encryption
- Author
-
Osama S. Faragallah
- Subjects
Plaintext-aware encryption ,Computer science ,Hash function ,Cryptography ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Computer security ,computer.software_genre ,Encryption ,Brute-force attack ,0202 electrical engineering, electronic engineering, information engineering ,Cryptographic hash function ,Hybrid cryptosystem ,Cryptosystem ,Electrical and Electronic Engineering ,Digital watermarking ,Threshold cryptosystem ,Goldwasser–Micali cryptosystem ,Authentication ,business.industry ,Advanced Encryption Standard ,020206 networking & telecommunications ,Computer Science Applications ,Deterministic encryption ,Key (cryptography) ,020201 artificial intelligence & image processing ,business ,computer ,Computer hardware - Abstract
The paper proposes a secure audio cryptosystem that realize integrity, authentication and confidentiality. The proposed audio cryptosystem achieves integrity by applying a message digest algorithm, authentication by employing LSB watermarking and confidentiality through encryption with Advanced Encryption Standard (AES) or RC6. The main concept of the proposed audio cryptosystem relays on XORing the plain-audio with one selected image from a private image database. Then, the mixed plain-audio blocks are LSB watermarked with the selected image hash value prior to ciphering. The proposed audio cryptosystem is prepared with the potential of increasing immunity against brute force attacks and providing integrity, authentication and confidentiality through the selected image hash value addition using LSB embedding as an extra key. Also, the extra XORing step removes residual intelligibility from the plain-audio blocks, fills the speechless intervals of audio conversation and helps in destroying format and pitch information. The proposed audio cryptosystem is compared with audio encryption using AES, and RC6 through encryption key performance indicators. The comparison outcomes ensured the superiority of the proposed audio cryptosystem. Security investigation of the proposed audio cryptosystem is studied from a precise cryptographic standpoint and tests ensured the superiority of the proposed audio cryptosystem from a cryptographic standpoint.
- Published
- 2017
28. Ciphertext-Only Attack on Linear Feedback Shift Register-Based Esmaeili-Gulliver Cryptosystem
- Author
-
Yongwoo Lee, Young-Sik Kim, and Jong-Seon No
- Subjects
Theoretical computer science ,Cramer–Shoup cryptosystem ,020206 networking & telecommunications ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Computer Science Applications ,Benaloh cryptosystem ,Modeling and Simulation ,Ciphertext ,0202 electrical engineering, electronic engineering, information engineering ,Cryptosystem ,Hybrid cryptosystem ,020201 artificial intelligence & image processing ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,Electrical and Electronic Engineering ,Arithmetic ,Ciphertext-only attack ,Threshold cryptosystem ,Goldwasser–Micali cryptosystem ,Mathematics - Abstract
Esmaeili and Gulliver recently proposed a secret key cryptosystem based on error-correcting codes in which a codeword modified by random insertions, deletions, and errors is used as a ciphertext. The secret keys used in this cryptosystem consist of random numbers generated by synchronized random number generators that are implemented using two distinct linear feedback shift registers (LFSRs) in each encryptor and decryptor, respectively. In this letter, we propose a ciphertext-only attack to break the Esmaeili-Gulliver cryptosystem based on LFSRs. The proposed attack requires $O(n)$ consecutive ciphertexts, where $n$ is the number of shift registers in the LFSR, which is the secret key size. The proposed attack consists of two steps, and the time complexity of the first step is linear in the secret key size while the second step is a polynomial-time algorithm.
- Published
- 2017
29. A new ElGamal-like cryptosystem based on matrices over groupring
- Author
-
Saba Inam and Rashid Ali
- Subjects
Plaintext-aware encryption ,Theoretical computer science ,010102 general mathematics ,Plaintext ,02 engineering and technology ,01 natural sciences ,Deterministic encryption ,Artificial Intelligence ,Computer Science::Multimedia ,0202 electrical engineering, electronic engineering, information engineering ,Cryptosystem ,Hybrid cryptosystem ,020201 artificial intelligence & image processing ,0101 mathematics ,Threshold cryptosystem ,Software ,ElGamal encryption ,Computer Science::Cryptography and Security ,Mathematics ,Goldwasser–Micali cryptosystem - Abstract
In this paper, we have developed a new ElGamal-like public key cryptosystem based on the matrices over a groupring. The underlying hard problem for this cryptosystem is the conjugacy search problem. That is, we have replaced the exponentiation of elements by conjugacy. This makes the key generation step more efficient. We also talk about different security aspects against known attacks. The proposed scheme is found to be secure against known plaintext attack when encryption uses a different random key for every new plaintext.
- Published
- 2016
30. Message mapping and reverse mapping in elliptic curve cryptosystem
- Author
-
Aritro Sengupta and Utpal Kumar Ray
- Subjects
Theoretical computer science ,Computer Networks and Communications ,Computer science ,Elliptic curve Diffie–Hellman ,Elliptic Curve Digital Signature Algorithm ,020206 networking & telecommunications ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Elliptic curve point multiplication ,0202 electrical engineering, electronic engineering, information engineering ,Curve25519 ,Cryptosystem ,Hyperelliptic curve cryptography ,020201 artificial intelligence & image processing ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,Elliptic curve cryptography ,Threshold cryptosystem ,Algorithm ,Computer Science::Cryptography and Security ,Information Systems - Abstract
Elliptic curve cryptography is used as a public-key cryptosystem for encryption and decryption in such a way that if one has to encrypt a message, then they attempt to map the message to some distinct point on the elliptic curve by modifying the message using a mapping algorithm. Although the arithmetic involved in elliptic curve cryptography is computationally less complex than other cryptographic algorithms, but conversion of simple messages to points on the elliptic curve has always been challenging. In this paper, we discuss the different schemes of message mapping in elliptic curve cryptosystem, the flaws of each method, and how vulnerable they are to cryptanalysis. We also derive the guidelines of a good message mapping scheme in elliptic curve cryptosystem. In the later part of this paper, we will discuss about a new mapping scheme that is resistible to frequency analysis and other forms of cryptanalysis. Copyright © 2016 John Wiley & Sons, Ltd.
- Published
- 2016
31. Threshold cryptosystem based on multiple cryptographic assumptions
- Author
-
Nik Nadhilah Nik Mohd Yusoff, Mohd Saiful Adli Mohamad, and Haslinda Ibrahim
- Subjects
Security analysis ,Theoretical computer science ,Computer science ,business.industry ,Cryptography ,Data_CODINGANDINFORMATIONTHEORY ,Encryption ,Public-key cryptography ,Discrete logarithm ,Key (cryptography) ,Cryptosystem ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,business ,Threshold cryptosystem - Abstract
A cryptosystem is a cryptographic scheme that allows a sender to encrypt and send a confidential message or document by using public key, while the receiver can decrypt the encrypted message into its original form by using secret key. Most of the existing cryptosystems are constructed based on single hard number theoretical problems. Furthermore, the concept of group-oriented cryptosystem, known as threshold cryptosystem gives an important role in developing a cryptosystem. In this research, a threshold cryptosystem based on two hard number theoretical problems is presented. The strength of this new threshold cryptosystem is the difficulty to solve both factoring and discrete logarithm problems simultaneously. The security analysis of the scheme shows that it is secure against common security attacks.
- Published
- 2019
32. Blockchain-Based Threshold Electronic Voting System
- Author
-
Lau Wang Fat, Xingye Lu, Man Ho Au, and Borui Gong
- Subjects
Blockchain ,Electronic voting ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,0202 electrical engineering, electronic engineering, information engineering ,Blind signature ,020201 artificial intelligence & image processing ,Threshold cryptosystem ,computer ,ElGamal encryption ,Anonymity - Abstract
In this paper, we propose a secure blockchain-based electronic voting (e-voting) system with distributed authorities. Specifically, we employ threshold blind signature to distribute trust for registration; and threshold ElGamal decryption to distribute trust in ballots tallying. Combining these techniques with decentralized blockchain technology, our system can achieve verifiability, eligibility, fairness and anonymity with reduced trust. We also analyze the efficiency of our system by implementing the proposed e-voting system on a typical laptop for performance evaluation. Our system is efficient enough to be employed in practice based on the experiment results.
- Published
- 2019
33. Improvement on Bitcoin’s Verifiable Public Randomness with Semi-Trusted Delegates
- Author
-
Mohammad Ali Akhaee, Elnaz Ebadi, Mohammadtaghi Badakhshan, and Habib Allah Yajam
- Subjects
business.industry ,Computer science ,020206 networking & telecommunications ,Cryptography ,02 engineering and technology ,Cryptographic protocol ,Computer security ,computer.software_genre ,Secret sharing ,0202 electrical engineering, electronic engineering, information engineering ,Secure multi-party computation ,Cryptosystem ,020201 artificial intelligence & image processing ,Verifiable secret sharing ,business ,Threshold cryptosystem ,computer ,Randomness - Abstract
Publicly Verifiable Randomness has many useful and interesting applications in e-voting, distributed cryptography, secure multiparty computation, lotteries, sports seeding and many more. While the output of a Publicly Verifiable Randomness is provably unpredictable for a strong adversary, it is expected that its closeness to a uniform distribution is verifiable for any party. The inherent randomness in public blockchains such as Bitcoin has been the topic of several research papers and been used in lotteries and other multi-party protocols. However, recently it has been argued that an adversary can have a significant impact on the probability distribution of the output with much lower financial cost. Here, in this paper, we propose a new scheme based on the properties of Verifiable Secret Sharing protocols and Threshold Cryptosystems, that uses semi-trusted third parties to improve the security of Verifiable Public Randomness from any public blockchain. We argue that a successful attack against our scheme to impose a bias on a single bit of the output randomness requires not only a significant financial cost but also a corruption of more than k out of n trusted delegates.
- Published
- 2018
34. Threshold attribute-based signcryption and its application to authenticated key agreement
- Author
-
Jing Qin, Jiankun Hu, Qianhong Wu, and Haibin Zheng
- Subjects
Theoretical computer science ,Cryptographic primitive ,Computer Networks and Communications ,Computer science ,business.industry ,020206 networking & telecommunications ,02 engineering and technology ,Encryption ,Computer security ,computer.software_genre ,Random oracle ,Public-key cryptography ,Digital signature ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,020201 artificial intelligence & image processing ,business ,computer ,Threshold cryptosystem ,Information Systems ,Signcryption - Abstract
Signcryption is a public key cryptosystem that achieves the functions of digital signature and public key encryption simultaneously. It significantly reduces the cost of traditional signature-then-encryption approach. Although a large body of signcryption schemes have been proposed, few works have been done on attribute-based signcryption (ABSC), which simultaneously achieves the functionalities of attribute-based encryption and attribute-based signature, two important cryptographic primitives proposed to enforce fine-grained access control and user authentication in cloud computing applications. In this paper, we present a threshold ABSC scheme. The scheme is proven secure under the well-established Decisional Bilinear Diffie–Hellman and the standard Computational Diffie–Hellman assumptions in the standard model. Compared with the state of the ABSC art, our scheme has comparable efficiency without relying on any random oracle. Furthermore, we construct an authenticated key agreement protocol based on this threshold attribute-based signcryption from the point of improving the security of cloud computing. Copyright © 2016 John Wiley & Sons, Ltd.
- Published
- 2016
35. A Secure Code Based Cryptosystem via Random Insertions, Deletions, and Errors
- Author
-
Mostafa Esmaeili and T. Aaron Gulliver
- Subjects
Plaintext-aware encryption ,Theoretical computer science ,Code word ,020206 networking & telecommunications ,Data_CODINGANDINFORMATIONTHEORY ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Information-theoretic security ,Computer Science Applications ,Deterministic encryption ,010201 computation theory & mathematics ,Modeling and Simulation ,0202 electrical engineering, electronic engineering, information engineering ,Hybrid cryptosystem ,Cryptosystem ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,Electrical and Electronic Engineering ,Threshold cryptosystem ,Algorithm ,Mathematics ,Goldwasser–Micali cryptosystem - Abstract
In this letter, a new code based cryptosystem with a public code is introduced. This cryptosystem is based on randomly flipping, deleting, and inserting bits into a codeword corresponding to a plaintext. The construction of a secure channel coding scheme using the proposed cryptosystem is presented. The key size and security of this scheme are analyzed. Not having the code as part of the key results in a key size comparable to many well-known symmetric key cryptosystems. It is shown that the best approach for an adversary to obtain the key has a very low success rate, which indicates that the cryptosystem provides excellent security.
- Published
- 2016
36. On the existence of provably secure cloud computing systems
- Author
-
Vladimir A. Zakharov, Alexander V. Shokurov, and N. P. Varnovsky
- Subjects
0209 industrial biotechnology ,Control and Optimization ,Computer science ,business.industry ,Public key cryptosystem ,Homomorphic encryption ,020207 software engineering ,Cloud computing ,02 engineering and technology ,Computer security ,computer.software_genre ,Human-Computer Interaction ,Computational Mathematics ,Cloud computing systems ,020901 industrial engineering & automation ,0202 electrical engineering, electronic engineering, information engineering ,business ,Threshold cryptosystem ,computer ,Astrophysics::Galaxy Astrophysics ,Computer Science::Cryptography and Security ,Goldwasser–Micali cryptosystem - Abstract
We study a formal model of cloud computing systems with auxiliary cryptoservers. Assuming an existence of a secure threshold somewhat homomorphic public key cryptosystem we show how to build a cloud computing system secure in this model.
- Published
- 2016
37. A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage
- Author
-
Yilei Wang, Sufang Zhou, Zhenhua Chen, Qiong Huang, and Shundong Li
- Subjects
Theoretical computer science ,Computer Networks and Communications ,Computer science ,0211 other engineering and technologies ,Access control ,Cloud computing ,02 engineering and technology ,computer.software_genre ,Theoretical Computer Science ,Random oracle ,0202 electrical engineering, electronic engineering, information engineering ,Proxy (statistics) ,Threshold cryptosystem ,021110 strategic, defence & security studies ,Database ,business.industry ,020206 networking & telecommunications ,Computer security model ,Proxy re-encryption ,Computer Science Applications ,Computational Theory and Mathematics ,business ,Semantic security ,Cloud storage ,computer ,Software - Abstract
For fine-grained data access control in cloud computing, for the first time, we introduce a new concept called restricted proxy re-encryption with keyword search, which combines the function of proxy re-encryption with keyword search and that of threshold cryptosystem. To demonstrate this concept, we present the formal syntax for restricted proxy re-encryption with keyword search, the security model, and a concrete construction. In our scheme, we take advantage of the techniques of threshold cryptosystem to restrict the capacity of the proxy cloud server, and in the meantime, we let the proxy cloud server can only re-encrypt the data containing a specified keyword, which matches the trapdoor from delegatee to provide an accurate access control for users. While in this process, the proxy cloud server learns nothing about the contents of data and keyword. Our scheme is proved to be semantically secure under the modified bilinear Diffie-Hellman assumption and the q-decisional bilinear Diffie-Hellman inversion assumption in the random oracle model. Finally, we apply the techniques in our scheme to some practical problems. Copyright © 2016 John Wiley & Sons, Ltd.
- Published
- 2016
38. Experimental optical secret sharing via an iterative phase retrieval algorithm
- Author
-
Gaurav Verma, Meihua Liao, Qi Xing, Wenqi He, Dajiang Lu, and Xiang Peng
- Subjects
Scheme (programming language) ,Authentication ,Computer science ,Mechanical Engineering ,02 engineering and technology ,021001 nanoscience & nanotechnology ,01 natural sciences ,Secret sharing ,Atomic and Molecular Physics, and Optics ,Field (computer science) ,Electronic, Optical and Magnetic Materials ,Image (mathematics) ,010309 optics ,0103 physical sciences ,Electrical and Electronic Engineering ,0210 nano-technology ,Phase retrieval ,Threshold cryptosystem ,computer ,Algorithm ,Realization (systems) ,computer.programming_language - Abstract
The concept of “threshold cryptosystem” is fresh and rare in the field of optical information security. Based on a phase retrieval algorithm, we propose a novel threshold scheme with optical realization. In this method, a secret image is encoded into three phase-only masks (POMs), of which any two could recover the secret image but any single one could not. Besides, every POM is designed to be uniquely correlated with a pre-determined authentication image, which could be more easily authenticated than the POM. Numerical simulations and optical experimental results are provided to demonstrate the feasibility of the proposed method.
- Published
- 2020
39. Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism
- Author
-
Long, Yu and Chen, Kefei
- Subjects
- *
PUBLIC key cryptography , *CIPHERS , *PLASTIC embedment of electronic equipment , *CYBERTERRORISM , *INFORMATION theory , *COMPUTER security , *DATA protection - Abstract
Abstract: As a practical extension of our previous work on certificateless threshold cryptosystem, this paper proposes the first direct certificateless threshold key encapsulation mechanism that inherits the same trust level of the original scheme and removes the length limitation of a traditional public key encryption. Security against threshold chosen-ciphertext attacks are proved in a random oracle model under a new assumption. It tolerates the Type I adversary that can replace public keys and the Type II adversary that has access to the system’s master key. The implied encapsulation scheme is very efficient when compared to the most efficient schemes in a traditional public key cryptosystem, and it is slightly more efficient in terms of key length and encapsulation speed when compared to the identity-based cryptosystems that have the same ciphertext overhead. Finally, we describe several potential modifications of our scheme. [Copyright &y& Elsevier]
- Published
- 2010
- Full Text
- View/download PDF
40. All-in-one group-oriented cryptosystem based on bilinear pairing
- Author
-
Chung, Jui-Ting, Li, Chuan-Ming, and Hwang, Tzonelih
- Subjects
- *
COMPUTER security , *DATA protection , *COMPUTER network management , *COMPUTER systems - Abstract
Abstract: This paper presents a novel all-in-one group-oriented cryptosystem (AGOC) in which the ciphertext can have one of four levels of confidentiality. These levels depend on whether decryption is allowed by (1) only one specified recipient, (2) every member of the group, (3) members of a specified subset acting cooperatively, and (4) members of any predetermined authorized subset, or any t out of n members, acting cooperatively. The newly proposed AGOC has the following merits: (1) every member of the receiving group needs to keep only one private key, (2) both ciphertexts and system parameters are of constant size, and (3) the scheme is secure against a chosen ciphertext attack in the random oracle model. [Copyright &y& Elsevier]
- Published
- 2007
- Full Text
- View/download PDF
41. Efficient and Adaptive Threshold Signatures for Ad hoc networks.
- Author
-
Di Pietro, Roberto, Mancini, Luigi Vincenzo, and Zanin, Giorgio
- Subjects
DATA transmission systems ,DIGITAL communications ,DIGITAL signatures ,DATA encryption ,COMPUTER network security - Abstract
Abstract: In this paper, we propose a secure, flexible, robust and fully distributed signature service, for ad hoc groups. In order to provide the service, we use a new threshold scheme, that allows to share a secret key among the current group members. The novelty of the scheme is in that it easily and efficiently enables dynamic increase of the threshold, according to the needs of the group, so that the service provides both adaptiveness to the level of threat the ad hoc group is subject to, and availability. We prove the correctness of the protocol and evaluate its efficiency. The changes to the threshold are performed by using a protocol that is efficient in terms of interactions among nodes and per-node required resources, resulting suitable even for resource-constrained settings. Finally, the same proposed scheme allows to detect nodes that attempt to disrupt the service, providing invalid contributions to the distributed signature service. [Copyright &y& Elsevier]
- Published
- 2007
- Full Text
- View/download PDF
42. Quantum Public-key Cryptosystem without Quantum Channels between Any Two Users using Non-orthogonal States
- Author
-
Yuwen Chen and Xiaoyu Li
- Subjects
Quantum network ,Theoretical computer science ,General Computer Science ,Quantum cryptography ,TheoryofComputation_GENERAL ,Cryptosystem ,Hybrid cryptosystem ,Quantum capacity ,Quantum information ,Quantum key distribution ,Threshold cryptosystem ,Computer Science::Cryptography and Security ,Mathematics - Abstract
A quantum public-key cryptosystem without quantum channels between any two users using non-orthogonal states is provided in this paper. Every user keeps a set of quantum particles in non-orthogonal states in a key management center (KMC) as the public key while he or she keeps the states of them as the private key. By the help of KMC users can accomplish secret communication and message authentication. The laws of quantum physics guarantee the unconditional security of this cryptosystem. No entangled states or complex quantum operations are needed. On the other hand there are no quantum channels needed to connecting any two users. So the public-key cryptosystem is easier to carry out and more robust in practice.
- Published
- 2015
43. Niederreiter Cascade Combination Cryptosystem Based on the Double Public Keys
- Author
-
Qv ChengQin, Wang HaoTian, Zhou Xue Guang, and Li Zhong Yuan
- Subjects
Theoretical computer science ,General Computer Science ,Computer science ,business.industry ,Concatenated error correction code ,Data_CODINGANDINFORMATIONTHEORY ,Paillier cryptosystem ,Benaloh cryptosystem ,Public-key cryptography ,Hybrid cryptosystem ,Cryptosystem ,Arithmetic ,business ,Threshold cryptosystem ,Goldwasser–Micali cryptosystem - Abstract
This paper firstly briefed the basic concepts of N public key cryptosystem, RS code and QC-LDPC code, and then put forward the cascade cryptosystem with the RS code being the outer code and QC-LDPC code being the internal code. At last, the writer analyzed in detail the security and performance of the N cryptosystem based on double public key, and thus proved its better security and performance than the traditional public key cryptosystem based on error correcting code. In addition, it is also endowed with higher practicability in complex environment.
- Published
- 2015
44. Efficient revocable certificateless encryption against decryption key exposure
- Author
-
Futai Zhang, Limin Shen, Yinxia Sun, and Robert H. Deng
- Subjects
Revocation ,Computer Networks and Communications ,business.industry ,Computer science ,Data_CODINGANDINFORMATIONTHEORY ,Encryption ,Computer security ,computer.software_genre ,Deterministic encryption ,Public-key cryptography ,Key (cryptography) ,Cryptosystem ,business ,computer ,Threshold cryptosystem ,Software ,Information Systems ,Standard model (cryptography) ,Computer network - Abstract
Certificateless public key cryptosystem (CLPKC) improves the identity based public key cryptosystem to be key-escrow free. Many research works on CLPKC have been presented so far. However, the revocation problem in CLPKC still lacks effective solutions. The current revocation approaches suffer from either low efficiency or security weakness. In this study, we propose the first ‘scalable revocable’ certificateless encryption (RCLE) scheme against ‘decryption key exposure’. The scheme is provably secure in the standard model. Moreover, we give a second interesting RCLE scheme whose decryption key is very short.
- Published
- 2015
45. An efficient ID-based Beta Cryptosystem
- Author
-
Chandrashekhar Meshram
- Subjects
Public-key cryptography ,Theoretical computer science ,General Computer Science ,Discrete logarithm ,business.industry ,Identity (object-oriented programming) ,Key (cryptography) ,Hybrid cryptosystem ,Cryptosystem ,business ,Threshold cryptosystem ,Baby-step giant-step ,Mathematics - Abstract
In 1984, Shamir [1] introduced the concept of an identity-based cryptosystem. In this system, each user needs to visit a public key generation (PKG) and identify himself before joining a communication network. Once a user is accepted, the PKG will provide him with a secret key. In this way, if a user wants to communicate with others, he only needs to know the “identity” of his communication partner and the public key of the PKG. There is no public file required in this system. However, Shamir did not succeed in constructing an identity based cryptosystem, but only in constructing an identity-based signature scheme. Meshram and Meshram [5] have proposed an identity-based beta cryptosystem, security under the generalized discrete logarithm problem with distinct discrete exponents in the multiplicative group of finite fields and integer factorization problem. In this paper, we propose some modification in identity-based beta cryptosystem based on generalized discrete logarithm problem with distinct discrete exponents in the multiplicative group of finite fields and integer factorization problem and we consider the security against a conspiracy of some entities in the proposed system and show the possibility of establishing a more secure system.
- Published
- 2015
46. An Enhanced and Secured RSA Key Generation Scheme (ESRKGS)
- Author
-
M. Thangavel, Mukund Murrali, P. Varalakshmi, and K. Nithya
- Subjects
Theoretical computer science ,Computer Networks and Communications ,Computer science ,NTRUEncrypt ,Deterministic encryption ,Strong prime ,Hybrid cryptosystem ,Cryptosystem ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,Safety, Risk, Reliability and Quality ,Threshold cryptosystem ,Software ,Goldwasser–Micali cryptosystem ,PKCS #1 - Abstract
Public-key cryptography can be claimed as the greatest and an excellent revolution in the field of cryptography. A public-key cryptosystem is used for both confidentiality and authentication. One such public-key cryptosystem is the RSA cryptosystem. In this paper, a modified and an enhanced scheme based on RSA public-key cryptosystem is developed. The proposed algorithm makes use of four large prime numbers which increases the complexity of the system as compared to traditional RSA algorithm which is based on only two large prime numbers. In the proposed Enhanced and Secured RSA Key Generation Scheme (ESRKGS), the public component n is the product of two large prime numbers but the values of Encryption (E) and Decryption (D) keys are based on the product of four large prime numbers (N) making the system highly secured. With the existing factorization techniques, it is possible only to find the primes p and q. The knowledge of n alone is not sufficient to find E and D as they are based on N. The time required for cryptanalysis of ESRKGS is higher than traditional RSA cryptosystem. Thus the system is highly secure and not easily breakable. A comparison is done between the traditional RSA scheme, a recent RSA modified scheme and our scheme to show that the proposed technique is efficient.
- Published
- 2015
47. Multi-document threshold signcryption scheme
- Author
-
Chien-Hua Tsai and Pin-Chang Su
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,Elliptic Curve Digital Signature Algorithm ,Cryptography ,Encryption ,Computer security ,computer.software_genre ,Cryptosystem ,Elliptic curve cryptography ,business ,Threshold cryptosystem ,computer ,Information Systems ,Key size ,Signcryption - Abstract
Without proper and well-managed encryption, digital communications interception is technically easy to tap over public networks, and it causes unauthorized disclosure of sensitive information and irreparable harm to individuals as well as organizations. To ensure that digital information remains complete, accessible and secure at all times, it needs to be reliably processed on security measures at both the sending and receiving ends. Signcryption like other aspects of a cryptographic system simultaneously provides the characteristics of both digital signature and encryption and can fulfill the basic security requirements of information confidentiality, integrity and availability in transmission. In this paper, we introduce a threshold signcryption scheme based on elliptic curve cryptography to combine the dynamic knapsack cryptosystem technique with the Chinese remainder theorem and achieve a more robust security cryptosystem for multi-document transmission. With the proposed composition scheme of threshold signcryption function, participants not only can employ the avalanche effect of unsystematic properties founded on the elliptic curve cryptography's point addition to chaotically generate pre-shared secure cipher keys against the counterfeiting or potential information leakage problems but also apply the advantages of a smaller key size and its high strength of security under the elliptic curve discrete logarithm problem assumption to carry out digital communications, which can be fast and reliably transmitted over a public channel. Copyright © 2014 John Wiley & Sons, Ltd.
- Published
- 2014
48. Threshold Sr2n Public key Cryptosystem
- Author
-
M. Sree devi
- Subjects
Computer science ,General Engineering ,Public key cryptosystem ,Cryptosystem ,Computer security ,computer.software_genre ,Threshold cryptosystem ,computer - Published
- 2016
49. A 256 bit implementation of ECC-RFID based system using Shamir secret sharing scheme and Keccak hash function
- Author
-
Marcel Ambroze, Ingo Stenget, Martin Tomlinson, and Ayad Al-Adhami
- Subjects
Scheme (programming language) ,Authentication ,020205 medical informatics ,business.industry ,Computer science ,Hash function ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,Shamir's Secret Sharing ,Authentication protocol ,0202 electrical engineering, electronic engineering, information engineering ,Elliptic curve cryptography ,business ,Threshold cryptosystem ,computer ,ElGamal encryption ,Computer network ,computer.programming_language - Abstract
The applications of using multi-tag RFID technology have rapidly grown to be used in different fields of life. However, security and privacy are the main issues with this technology. In RFID multi-tags applications, a number of tags need to be securely authenticated. Although, various authentication protocols have been proposed, most of these protocols still lack of providing enough security and privacy levels. In order to overcome the security and privacy issues, this paper discusses the implementation of high-performance 256 bit elliptical curve cryptography (ECC) based system with ElGamal threshold cryptosystem. The security and privacy levels are ensured by providing a 256 bit ECC with Shamir Secret sharing scheme to distribute secure information amongst multiple RFID tags. For ensuring integrity of the data, the Keccak hash function has been used in the authentication phases
- Published
- 2017
50. A novel public key cryptosystem based on Merkle-Hellman Knapsack Cryptosystem
- Author
-
M. Thangavel and P. Varalakshmi
- Subjects
Theoretical computer science ,Plaintext-aware encryption ,Computer science ,Modulus ,Merkle–Hellman knapsack cryptosystem ,Key distribution ,Cryptography ,02 engineering and technology ,Computer security ,computer.software_genre ,Encryption ,law.invention ,Paillier cryptosystem ,Public-key cryptography ,Secure communication ,law ,0202 electrical engineering, electronic engineering, information engineering ,Cryptosystem ,Hybrid cryptosystem ,Session key ,Key management ,Threshold cryptosystem ,Goldwasser–Micali cryptosystem ,business.industry ,Key distribution center ,Cramer–Shoup cryptosystem ,020206 networking & telecommunications ,Benaloh cryptosystem ,Deterministic encryption ,020201 artificial intelligence & image processing ,business ,Cryptanalysis ,computer - Abstract
Cryptography is the essential component in any protocols for securing the communication. Diffie and Hellman introduced the concept of Public key cryptosystem, which uses two different keys for secure communication. Ralph Merkle and Martin Hellman invented a public-key cryptosystem named as Merkle-Hellman Knapsack Cryptosystem (MHKC) which is an NP-complete combinatorial problem believed that computationally difficult to solve by intruders. All the public key elements are the modulus of multiples of super increasing sequence. Adi Shamir performs cryptanalysis and breaks the MHKC in polynomial time. In this paper, a novel public key cryptosystem based on MHKC (NPKC-MHKC) has been proposed, which is secure than MHKC. NPKC-MHKC consists of Public key, Private key, and Session key. Since all the three keys depend on each other, it is computationally infeasible for the intruder to break the cryptosystem. The performance analysis shows that the execution time of NPKC-MHKC is comparatively lesser than MHKC and security analysis proves that NPKC-MHKC is secure than MHKC. So, NPKC-MHKC can be implemented in High-performance computing applications.
- Published
- 2017
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.