Filters








13 Hits in 8.8 sec

An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys [chapter]

Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria
2006 Lecture Notes in Computer Science  
It also allows session keys to be renewed in subsequent sessions without the server's further involvement even in the event that the long-term key or the earlier session key have been compromised.  ...  A security proof in the Bellare-Rogaway model and the random oracle model is provided for a protocol closely based on one originally proposed by Boyd (1996) , which enjoys some remarkable efficiency properties  ...  Section 4 describes the limitation of the proof for the original protocol and extends the model so that there is capability to reset long-term keys.  ... 
doi:10.1007/11780656_31 fatcat:66rtpv7pr5dp7h766j5gql7x7a

Just fast keying

William Aiello, Steven M. Bellovin, Matt Blaze, Ran Canetti, John Ioannidis, Angelos D. Keromytis, Omer Reingold
2004 ACM Transactions on Privacy and Security  
It is simple, efficient, and secure; we sketch a proof of the latter property.  ...  We describe Just Fast Keying (JFK), a new key-exchange protocol, primarily designed for use in the IP security architecture.  ...  The starting point for our treatment and analysis is based on that of Canetti and Krawczyk [2001] , which in turn is based on Bellare and Rogaway [1993] .  ... 
doi:10.1145/996943.996946 fatcat:6lmsda5cjzaepbftzgzwowplci

Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions

Jorge Guajardo, Boris Škorić, Pim Tuyls, Sandeep S. Kumar, Thijs Bel, Antoon H. M. Blom, Geert-Jan Schrijen
2008 Information Systems Frontiers  
In an ambient world, where (potentially) sensitive information is continually being gathered about us, it is critical that those keys be both securely deployed and safeguarded from compromise.  ...  In this paper, we provide solutions for secure key deployment and storage of keys in sensor networks and RFID systems based on the use of Physical Unclonable Functions (PUFs).  ...  As in Bellare and Rogaway (1993) , we do not consider it to be an attack if the adversary only relays messages between the intended parties as this can not be prevented.  ... 
doi:10.1007/s10796-008-9142-z fatcat:a5x7bzyvprexpflzg65wvpaphi

Hedging Public-Key Encryption in the Real World [chapter]

Alexandra Boldyreva, Christopher Patton, Thomas Shrimpton
2017 Lecture Notes in Computer Science  
for an underlying PKE scheme.  ...  We also propose a new security notion, MM-CCA, which generalizes traditional IND-CCA to admit imperfect randomness. Like IND-CCA, and unlike IND-CDA, our notion gives the adversary the public key.  ...  We thank Cihan Eryonucu for providing an initial survey of APIs during his visit to Georgia Tech.  ... 
doi:10.1007/978-3-319-63697-9_16 fatcat:xphbmdkgbrh2hjpiejndsfwf7i

Employing Blockchain Technology to Strengthen Security of Wireless Sensor Networks

Sung-Jung Hsiao, Wen-Tsai Sung
2021 IEEE Access  
This paper integrates blockchain-based technology with data transfer to establish an extremely secure WSNs structure.  ...  The "mobile database" node of this study uses embedded microcontrollers with an operating system, such as Raspberry Pi and Arduino Yun.  ...  The random oracle model, proposed by Bellare and Rogaway in 1993, is an ideal mathematical model for hash functions. A function based on this model behaves as follows: a.  ... 
doi:10.1109/access.2021.3079708 fatcat:olz2bynzyvbwznepda6rbetjye

Cascading Network Failure in Power Grid Blackouts [chapter]

Dr.Ian Dobson
2014 Encyclopedia of Systems and Control  
The emerging risk analysis, simulation, and modeling of cascading blackouts are briefly surveyed, and key references are suggested.  ...  Cascading failure consists of complicated sequences of dependent failures and can cause large blackouts.  ...  Technical report 81, EATCS Bellare M, Rogaway P (1995) The complexity of approx- imating a nonlinear program.  ... 
doi:10.1007/978-1-4471-5102-9_264-1 fatcat:slhzrvsilfephprfzlkkccbyma

Cooperative Manipulators [chapter]

Fabrizio Caccavale
2015 Encyclopedia of Systems and Control  
The emerging risk analysis, simulation, and modeling of cascading blackouts are briefly surveyed, and key references are suggested.  ...  Cascading failure consists of complicated sequences of dependent failures and can cause large blackouts.  ...  Technical report 81, EATCS Bellare M, Rogaway P (1995) The complexity of approx- imating a nonlinear program.  ... 
doi:10.1007/978-1-4471-5058-9_175 fatcat:gzo7xen4ynezhesyrpsldzj5bi

Report from Dagstuhl Seminar 11391

Marc Fischlin, Anna Lysyanskaya, Ueli Maurer, Alexander May, Marc Fischlin, Anna Lysyanskaya, Ueli Maurer, Alexander May
unpublished
From September 25th till September 30th, 2011, the Dagstuhl Seminar 11391 about "Public-Key Cryptography" took place at Schloss Dagstuhl.  ...  September, 2011-www.dagstuhl.de/11391 1998 ACM Subject Classification D.4.6 Security and Protection  ...  -Public-Key  ... 
fatcat:vrpb4qyi45g2bgxdrcastgdmae

Uncertainty modeling and analysis with intervals: Foundations, tools, applications (Dagstuhl Seminar 11371) Quantum Cryptanalysis (Dagstuhl Seminar 11381) Public-Key Cryptography (Dagstuhl Seminar 11391)

Markus Schneider, Gottfried Vossen, Esteban Zimányi, Isaac Elishakoff, Vladik Kreinovich, Wolfram Luther, Evgenija Popova, Serge Fehr, Michele Mosca, Martin Rötteler, Rainer, Marc Fischlin (+3 others)
2011 unpublished
Thanks go to Martin Fuchs for his help in collecting abstracts of the talks and other related materials for these proceedings. -Public-Key  ...  Acknowledgements We would like to thank the staff of Schloss Dagstuhl for their help in organizing this seminar and for the excellent facilities.  ...  We then propose an extension of functional encryption to probabilistic functionalities.  ... 
fatcat:xrywj3jmmnb5dm2ohmysv2zxjm

) 1. Secure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving Hongfeng Zhu 1001-1009 A Publicly Verifiable Secret Sharing Scheme Based on Multilinear Diffie-Hellman Assumption Qiao Peng

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+91 others)
2016 International Journal of Network Security   unpublished
Nowadays chaos theory related to cryptography has been addressed widely, so there is an intuitive connection between group key agreement and chaotic maps.  ...  Such a connector may lead to a novel way to construct authenticated and efficient group key agreement protocols.  ...  Acknowledgments The authors would like to thank INSFORNET Acknowledgments This work is supported by the National Natural Science Foundation of China (Project 61303200, 61411146001) and the project of  ... 
fatcat:nivpmyymvvecpft6npkuhw7smi

Dagstuhl Reports, Volume 6, Issue 1, January 2016, Complete Issue [article]

2016
MPC: killer applications and threat models for applications  ...  However, an unknown party replaced the parameters with different parameters, and the implementation contained a subtle bug that caused the direct output of the RNG cascade to be raw Dual-EC output.  ...  o video signals, advanced information fusion and long term learning.  ... 
doi:10.4230/dagrep.6.1 fatcat:vq74ezrwifbkhex6twvtdzbpaa

Design and evaluation of a network-based asynchronous architecture for cryptographic devices

L. Dilparic, D.K. Arvind
Proceedings. 15th IEEE International Conference on Application-Specific Systems, Architectures and Processors, 2004.  
My dear friends John, Spyros, Fotini, Katarina, Alin, Cornelia, Chris and Evie for making my stay in Edinburgh an indeed wonderful experience.  ...  To my (at the time unborn) baby Tihomir for making the time during the thesis writeup the most memorable and wonderful time of my life. Glory to God for all things!  ...  Acknowledgements I am deeply grateful to my husband, Joseph, for his love, patience and continuous support during the many difficult times of my PhD studies.  ... 
doi:10.1109/asap.2004.1342470 fatcat:uki6krxwnjbyvm5dovz6i52qc4

Online) International Journal of Network Security is published both in traditional paper form

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+102 others)
2016 International Journal of Network Security   unpublished
In performance analysis, it is observed that the Zone Routing Protocol (ZRP) out-performs the other MANET routing protocols in terms of network performance and security for the proposed scheme.  ...  Trust management plays the role of maintaining the relationship between nodes for long endeavor.  ...  Acknowledgments The authors would like to thank the anonymous reviewers and the editor for their comments that will help them to improve this paper.  ... 
fatcat:ez6kvrzkuzg75nulaxycvfvxcq