Filters








35,291 Hits in 5.7 sec

An Efficient Attack on a Code-Based Signature Scheme [chapter]

Aurélie Phesso, Jean-Pierre Tillich
2016 Lecture Notes in Computer Science  
T = s * T and weight(σ) ≤ (m T w + w c )m S If this is not the case, the signature is discarded.  ...  Input : s = Hash(m) ∈ {0, 1} r and w ∈ N, H ∈ {0, 1} r ×n Output : e ∈ {0, 1} n : signature, weight(e) ≤ w and He T = Hash(m) T Verification The verifier computes s * def = F(Hash(m||i)) and checks H σ  ...  SECRET Project -INRIA Paris ) An Efficient Attack on a Code-based Signature Scheme  ... 
doi:10.1007/978-3-319-29360-8_7 fatcat:qybujbuvmje2nbjr6zh6ekobgq

An efficient dynamic-identity based signature scheme for secure network coding

Yixin Jiang, Haojin Zhu, Minghui Shi, Xuemin (Sherman) Shen, Chuang Lin
2010 Computer Networks  
In this paper, we propose a novel dynamic-identity based signature scheme for network coding by signing linear vector subspaces.  ...  The network coding based applications are vulnerable to possible malicious pollution attacks.  ...  An efficient dynamic-identity based signature scheme for network coding In this section, we propose an efficient dynamic-identity based signature scheme for network coding, where each node can rapidly  ... 
doi:10.1016/j.comnet.2009.08.006 fatcat:ffygp4bq2rhvzgzusiphyft6rq

On security against pollution attacks in network coding enabled 5G networks

Vipindev Adat, Christos Tselios, Ilias Politis
2020 IEEE Access  
The survey goes a step further and includes a potential secure implementation of network coding enabled 5G networks, based on cooperating small cells.  ...  Further, in a wireless environment, the authenticity of intermediate nodes is not easy to ensure, making it easier for an attacker to be part of the network.  ...  An identity-based signature scheme for network coding was proposed by Jiang et al. [69] .  ... 
doi:10.1109/access.2020.2975761 fatcat:vaz7xqagbrhatino4a3kuytaxu

An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks

Z. Yu, Y. Wei, B. Ramkumar, Y. Guan
2008 IEEE INFOCOM 2008 - The 27th Conference on Computer Communications  
In addition, we present an alternate lightweight scheme based on a much simpler linear signature function. This alternate scheme provides a tradeoff between computation efficiency and security.  ...  In this paper, we propose an efficient signature-based scheme to detect and filter pollution attacks for the applications adopting linear network coding techniques.  ...  ACKNOWLEDGMENTS We thank Shamus Software Ltd. for software package MIRACL, and Haodong Wang and Qun Li for their software implementation of public key cryptosystems on MicaZ.  ... 
doi:10.1109/infocom.2008.199 dblp:conf/infocom/YuWRG08 fatcat:kfpzerpqn5h55byylod7ztywv4

An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model

Guomin Zhou, Peng Zeng, Xiaohui Yuan, Siyuan Chen, Kim-Kwang Raymond Choo
2017 Security and Communication Networks  
Moreover, as a threshold ring signature scheme, our scheme is as efficient as the normal code-based ring signature.  ...  There is a pressing need to design PKC schemes that are secure against quantum attacks. In this paper, we propose a novel code-based threshold ring signature scheme with a leader-participant model.  ...  This enables our scheme to be an efficient code-based threshold ring signature scheme.  ... 
doi:10.1155/2017/1915239 fatcat:6uihy6bsm5b35cs5nvyeywmpqu

An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks

Z. Yu, Y. Wei, B. Ramkumar, Y. Guan
2008 2008 Proceedings IEEE INFOCOM - The 27th Conference on Computer Communications  
In addition, we present an alternate lightweight scheme based on a much simpler linear signature function. This alternate scheme provides a tradeoff between computation efficiency and security.  ...  In this paper, we propose an efficient signature-based scheme to detect and filter pollution attacks for the applications adopting linear network coding techniques.  ...  ACKNOWLEDGMENTS We thank Shamus Software Ltd. for software package MIRACL, and Haodong Wang and Qun Li for their software implementation of public key cryptosystems on MicaZ.  ... 
doi:10.1109/infocom.2007.199 fatcat:uci4odvmifeyxbrt55hnlkyiti

Recent Progress in Code-Based Cryptography [chapter]

Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui, Gerhard Hoffmann, Mohammed Meziani, Robert Niebuhr
2011 Communications in Computer and Information Science  
Section 3 deals with the new improvements of code-based signature schemes and Section 4 presents the new results in code-based secret-key cryptography.  ...  The last three years have witnessed tremendous progress in the understanding of code-based cryptography.  ...  Signature In code-based cryptography, there have been many attempts to design signature schemes using linear codes.  ... 
doi:10.1007/978-3-642-23141-4_3 fatcat:tydg6d5zunhbplpchcnozoaanm

A Novel Digital Signature based on Error Correcting Codes

Younes Bayane, Fatima Amounas, Lahcen El Bermi
2019 International Journal on Recent and Innovation Trends in Computing and Communication  
altered in transit (integrity).The idea of constructing practical signatures based on error correcting codes was introduced by Courtois et al in [1].  ...  The proposed method consists of reordering the message bits to get a decodable word. Then apply an efficient decoding algorithm to get signature.  ...  Thus, in 1990, Xinmei Wang proposed the first code-based signature scheme based on error correcting codes in [4] .  ... 
doi:10.17762/ijritcc.v7i3.5253 fatcat:ux7q3fgul5fj5j5cyretjdz4ui

Security issues of CFS-like digital signature algorithms [article]

Giuseppe D'Alconzo, Alessio Meneghetti, Paolo Piasenti
2021 arXiv   pre-print
We show how the adoption of some code-based hash-functions to improve the efficiency of CFS leads to the ability of an attacker to produce a forgery compatible to the rightful user's public key.  ...  We analyse the security of some variants of the CFS code-based digital signature scheme.  ...  The second author is a member of the INdAM Research group GNSAGA and of the Cryptography and Coding group of the Unione Matematica Italiana (UMI).  ... 
arXiv:2112.00429v1 fatcat:hob4xsw5qjbo5auleaacld5j2i

Two-step hierarchical scheme for detecting detoured attacks to the web server

Byungha Choi, Kyungsan Cho
2013 Computer Science and Information Systems  
In this paper, we propose an improved detection scheme to protect a Web server from detoured attacks, which disclose confidential/private information or disseminate malware codes through outbound traffic  ...  The first step is a signature-based detector that uses Snort and detects the marks of disseminating malware, XSS, URL Spoofing and information leakage from the Web server.  ...  That is, Web-based attacks focus on an application itself and functions on layer 7 of the OSI [13] .  ... 
doi:10.2298/csis120908026c fatcat:4utvlrevonbcxglqamrrde4z4u

An efficient ECC-based mechanism for securing network coding-based P2P content distribution

Heng He, Ruixuan Li, Zhiyong Xu, Weijun Xiao
2013 Peer-to-Peer Networking and Applications  
In this paper, we propose an efficient ECC-based mechanism for securing network coding-based P2P content distribution, namely ESNC, which includes an efficient network coding signature scheme and an identity-based  ...  The two schemes cooperate to thwart pollution attacks on network coding effectively in P2P networks, not only detecting corrupted blocks on-the-fly efficiently, but also precisely identifying all the malicious  ...  It is an integrated mechanism because it consists of both an efficient network coding signature scheme and an identity-based malicious peer identification scheme.  ... 
doi:10.1007/s12083-013-0239-x fatcat:6ma2ooczl5bohgzdowcyazxjqe

Reliable Enhanced Secure Code Dissemination with Rateless Erasure Codes in WSNs

Yong Zeng, Xin Wang, Zhihong Liu, Jianfeng Ma, Lihua Dong
2014 Journal of Software  
Rateless erasure codes based approaches can reduce the overhead, while failed in defeating DoS attacks.  ...  This paper proposed a novel code dissemination scheme, which integrates immediately authentication into rateless erasure codes.  ...  Hgedorn [6] and Rossi [7] proposed efficient code image dissemination scheme based on random linear codes and digital Fountain codes, respectively.  ... 
doi:10.4304/jsw.9.1.190-194 fatcat:wxcjxazczbho3pdsx56n2lytta

MABS: Multicast Authentication Based on Batch Signature

Yun Zhou, Xiaoyan Zhu, Yuguang Fang
2010 IEEE Transactions on Mobile Computing  
with a signature, and spread the effect of the signature across all the packets in the block through hash graphs or coding algorithms.  ...  overhead due to an efficient cryptographic primitive called batch signature, which supports the authentication of any number of packets simultaneously.  ...  In addition to the one based on RSA [33] , we propose two new batch signature schemes based on BLS [36] and DSA [38] , which are more efficient than batch RSA.  ... 
doi:10.1109/tmc.2010.37 fatcat:hjcbs52v3rggrf3fa5ql2sxj2i

Cryptanalysis of a code-based full-time signature [article]

Nicolas Aragon, Marco Baldi, Jean-Christophe Deneuville, Karan Khathuria, Edoardo Persichetti, Paolo Santini
2021 arXiv   pre-print
We present an attack against a code-based signature scheme based on the Lyubashevsky protocol that was recently proposed by Song, Huang, Mu, Wu and Wang (SHMWW).  ...  This confirms that devising secure code-based signature schemes with efficiency comparable to that of other post-quantum solutions (e.g., based on lattices) is still a challenging task.  ...  Acknowledgement The authors thank Philippe Gaborit for insightful discussions on preliminary versions of this work.  ... 
arXiv:2011.08326v2 fatcat:jpzckpvgkrd6zdqbk74eo2lpje

Detection of Insider Attacks to the Web Server

Byungha Choi, Kyungsan Cho
2012 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
Our proposed scheme has a two-step hierarchy with a signature-based detector using Snort, and an anomaly-based detector using HMM.  ...  In this paper, we propose a detection scheme to protect the Web server by inspecting HTTP outbound traffic from insider attacks which reveal confidential/private information or spread malware codes through  ...  Our proposed scheme shown in Figure 2 is a two-step detection system composed of a signature-based IDS using Snort and an anomaly-based IDS using HMM.  ... 
doi:10.22667/jowua.2012.12.31.035 dblp:journals/jowua/ChoiC12 fatcat:xcthnm6rszatxmqweciuakmd6u
« Previous Showing results 1 — 15 out of 35,291 results