1,322 Hits in 3.8 sec

An Efficient Attack on All Concrete KKS Proposals [chapter]

Ayoub Otmani, Jean-Pierre Tillich
2011 Lecture Notes in Computer Science  
It efficiently recovers the private key of all schemes of this type existing in the literature.  ...  In this paper we investigate the security of these schemes and suggest a simple attack based on (essentially) Stern's algorithm for finding low weight codewords.  ...  On the other hand, the KKS proposal does not rely on Goppa codes and can be instantiated with random codes.  ... 
doi:10.1007/978-3-642-25405-5_7 fatcat:w4rf4z2yijacbma7ul6mfr4fp4

An Improved Authentication and Key Agreement scheme for Session Initial Protocol

2017 KSII Transactions on Internet and Information Systems  
Furthermore, we propose an improved and efficient authentication and key agreement scheme by using elliptic curve cryptosystem.  ...  The security and efficiency are two urgent requirements and admired properties of SIP. Recently, Hamed et al. proposed an efficient authentication and key agreement scheme for SIP.  ...  The security analysis proves that our proposed scheme could resist all known security attacks.  ... 
doi:10.3837/tiis.2017.08.015 fatcat:3bzryhahzzdurmhg7no6nmvfca

One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange [chapter]

Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee
2006 Lecture Notes in Computer Science  
It is the first provably-secure one-round protocol for verifier-based PAKE in the two-party setting.  ...  This scheme matches the most efficient verifier-based PAKE protocol among those found in the literature.  ...  Concretely, Adv pake-kk&fs VB−PAKE (k, T, q ex , q se , q h ) ≤ 4q h N s Adv cdh G,A (T ) + q se PW + (q ex + q se ) 2 q , where T is the maximum total game time including an adversary's running time,  ... 
doi:10.1007/11909033_8 fatcat:yt4pxcpyjvcipcfdlrvgjkjr2q

State of the Art on Mobility and Transport data protection technologies

2021 Zenodo  
On the other hand, in IFS the first step is to interpolate the curve in each time interval by using the cubic Bézier interpolation and then sample an alternative trajectory 𝑇𝑇 𝑚𝑚𝑖𝑖𝑚𝑚 .  ...  In SFI, given a trajectory 𝑇𝑇, it is partitioned in groups of 𝑘𝑘 = ⌈1 𝛿𝛿 ⁄ ⌉ points and a random point is chosen from each group.  ...  Instead of exploiting the unicity of mobility data, an attacker might exploit its regularity. De Mulder et al. 118 propose a record linkage attack based on mobility models.  ... 
doi:10.5281/zenodo.6811373 fatcat:qwcyotcs3bds5jswcc6lgbonuq

Throughput and Interference for Cooperative Spectrum Sensing: A Malicious Perspective

2021 KSII Transactions on Internet and Information Systems  
On the basis of this, we further make an investigation on the condition of making the fusion center (FC) blind when the fusion rule is unknown for the MU.  ...  Finally, theoretical proofs and simulation results verify the correctness and effectiveness of analyses about the impact of Byzantine attack strategy on the throughput and interference.  ...  Ren et al. proposed an algorithm which take Byzantine attack and energy efficiency into consideration in [20] . F.  ... 
doi:10.3837/tiis.2021.11.019 fatcat:tbktgltmxveyninljfai3erpry

An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments

S.K. Hafizul Islam, Ruhul Amin, G.P. Biswas, Mohammad Sabzinejad Farash, Xiong Li, Saru Kumari
2017 Journal of King Saud University: Computer and Information Sciences  
The proposed protocol is based on the elliptic curve cryptography and one-way cryptographic hash function.  ...  Therefore, the proposed protocol is more efficient and suitable for practical use than other protocols in mobile-commerce environments. Ó 2015 The Authors.  ...  parallel attack, and further proposed an improved 3PAKE protocol based on ECC.  ... 
doi:10.1016/j.jksuci.2015.08.002 fatcat:kckbp4ejuvgp3ddyayvzg4oubq

An encryption scheme based on Random Split of St-Gen codes

Simona Samardjiska, Danilo Gligoroski
2016 2016 IEEE International Symposium on Information Theory (ISIT)  
In this paper we propose a method for random splitting of St-Gen Codes and use it to design a new coding based public key encryption scheme.  ...  We also thank Jean-Charles Faugère and Ludovic Perret for their hospitality at LIP6 and long discussions about algebraic attacks on these systems.  ...  This approach has been used to attack a McEliece variant based on convolutional codes [20] and against the KKS scheme in [21] .  ... 
doi:10.1109/isit.2016.7541409 dblp:conf/isit/SamardjiskaG16 fatcat:v4mvyiqp4bcehf53umov5ro3ju

Multi-user quantum private comparison with scattered preparation and one-way convergent transmission of quantum states

TianYu Ye, ZhaoXu Ji
2017 Science China Physics Mechanics and Astronomy  
The proposed MQPC protocol can be implemented with current technologies.  ...  Analysis turns out that its output correctness and its security against both the outside attack and the participant attack are guaranteed.  ...  Concretely speaking, if   0 0 , 1 1 ij kk PT P T MM  , TP sets 0 ij k T C = ; and if   0 1 , 1 0 ij kk PT P T MM  , TP sets 1 ij k T C = .  ... 
doi:10.1007/s11433-017-9056-6 fatcat:jyxrdeae35be3asfngkjup4rqa

Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy

2017 KSII Transactions on Internet and Information Systems  
To overcome these problems, in this paper, we propose an efficient and secure auditing scheme based on identity-based cryptography.  ...  To ensure the security of cloud storage, many cloud auditing schemes are proposed to check the integrity of users' cloud data.  ...  [26] proposed an identity-based public auditing scheme which can efficiently support batch auditing for multiple users.  ... 
doi:10.3837/tiis.2017.10.019 fatcat:rqwtila2gfckxnfei5lhiemqk4

Information leakage resistant quantum dialogue against collective noise

TianYu Ye
2014 Science China Physics Mechanics and Astronomy  
In each of the two proposed protocols, the secret messages are encoded on the initial logical qubits via two composite unitary operations.  ...  attack, the entangle-measure attack and the correlation-elicitation (CE) attack.  ...  [59] , the two proposed protocols have a poorer performance on the information-theoretical efficiency.  ... 
doi:10.1007/s11433-014-5566-2 fatcat:liytvbxs3rfe3nv5kqw6jkmp7i

Automatic security verification for 3-party authentication and key exchange protocols

Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake
2011 2011 5th International Conference on Network and System Security  
In this paper, we reconsider the OKT method and propose an updated security verification method for authentication and key exchange protocols based on the BPR model.  ...  In addition, we describe the relations among the six verification points, explain how the proposed method verifies the aforementioned protocols by providing one example and show the validity of the proposed  ...  [Active attack (e.g., replay attack, man-in-the-middle attack and so on)] -Known key security (SS-KKS) [3, 4] An adversary cannot obtain a target session key even when he/she obtains session keys in  ... 
doi:10.1109/icnss.2011.6060010 dblp:conf/nss/OtaKM11 fatcat:lsnwnejbhjccjjjo2gl2gfqtye

TinyIBAK: Design and Prototype Implementation of An Identity-based Authenticated Key Agreement Scheme for Large Scale Sensor Networks

2013 KSII Transactions on Internet and Information Systems  
This version includes a concrete analysis and supporting implementation results on MICAz motes and TOSSIM.  ...  Experimental results indicate that our proposal consumes an acceptable amount of resources, and is feasible for infrequent key distribution and rekeying in large scale sensor networks.  ...  Moreover, we evaluated the effect of the node density on the performance of our scheme within the TOSSIM simulation framework.  ... 
doi:10.3837/tiis.2013.11.013 fatcat:4t7l6xnutzh3xpumx34tcftcge

PolarSig: An efficient digital signature based on polar codes

Pouyan Forghani, Masoumeh Koochak Shooshtari, Mohammad Reza Aref
2020 IET Communications  
In this study, the authors propose an efficient digital signature, PolarSig, which can reduce both public key size and signing time simultaneously.  ...  Moreover, they apply puncturing and randomised omitting of frozen bits to protect the authors' scheme from commonplace attacks targeting former cryptosystems based on polar codes.  ...  Therefore, nowadays, KKS is considered as a one-time signature. Recently, a new signature scheme is proposed based on the KKS structure [5] .  ... 
doi:10.1049/iet-com.2019.0578 fatcat:xuouzim7dnbj7g7yxknnos7ob4

Security issues of CFS-like digital signature algorithms [article]

Giuseppe D'Alconzo, Alessio Meneghetti, Paolo Piasenti
2021 arXiv   pre-print
We show how the adoption of some code-based hash-functions to improve the efficiency of CFS leads to the ability of an attacker to produce a forgery compatible to the rightful user's public key.  ...  at best one-time signature schemes; additionally, strong caution has to be taken in the choice of parameters, as shown by [21] which broke all the parameters proposed in [2, 15, 16] .  ...  We show an attack on this construction. The third and final section generalizes the strategy adopted in the mCFS c signature and shows that such approach leads to an attack.  ... 
arXiv:2112.00429v1 fatcat:hob4xsw5qjbo5auleaacld5j2i

Block-Based Scheme for Database Integrity Verification

Lancine Camara, Junyi Li, Renfa Li, Faustin Kagorora, Damien Hanyurwimfura
2014 International Journal of Security and Its Applications  
The proposed technique is highly resilient to common attacks and it overcomes some limitations of previous approaches on fragile watermarking.  ...  Furthermore, we evaluated our scheme on a real case study and results show its effectiveness. The proposed scheme can detect and localize the malicious modifications made to the database.  ...  Furthermore, we have presented an efficient way to compute the optimal watermark decoding threshold.  ... 
doi:10.14257/ijsia.2014.8.6.03 fatcat:me4hgriijvakfj2rscfb4yawwq
« Previous Showing results 1 — 15 out of 1,322 results