Filters








4,507 Hits in 5.7 sec

Breaking four mix-related schemes based on Universal Re-encryption

George Danezis
2007 International Journal of Information Security  
In this work we analyze four schemes related to mix networks that make use of Universal Re-encryption and find serious weaknesses in all of them.  ...  The fourth scheme, the rWonGoo anonymous channel, turns out to be less secure than the original Crowds scheme, on which it is based.  ...  Discussions, over they years, with Paul Syverson about how to build mix networks based on Universal Re-encryption were invaluable to understand how to attack them.  ... 
doi:10.1007/s10207-007-0033-y fatcat:n2ox6otdq5abfajaldgkkvdjxm

Breaking Four Mix-Related Schemes Based on Universal Re-encryption [chapter]

George Danezis
2006 Lecture Notes in Computer Science  
In this work we analyze four schemes related to mix networks that make use of Universal Re-encryption and find serious weaknesses in all of them.  ...  The fourth scheme, the rWonGoo anonymous channel, turns out to be less secure than the original Crowds scheme, on which it is based.  ...  Discussions, over they years, with Paul Syverson about how to build mix networks based on Universal Re-encryption were invaluable to understand how to attack them.  ... 
doi:10.1007/11836810_4 fatcat:vjuhvl4m3vda5ngbuvfjpz3pfy

A Secure M + 1st Price Auction Protocol Based on Bit Slice Circuits

Takuho MITSUNAGA, Yoshifumi MANABE, Tatsuaki OKAMOTO
2016 IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences  
We apply the Boneh-Goh-Nissim encryption to the mix-and-match protocol to reduce the computation costs.  ...  Conclusion We introduced new efficient secure M + 1st price auction protocols based on the mix-and-match protocol and the BGN encryption.  ...  As a topic of future work, we will try to compose a secure auction protocol without using the mix-and-match protocol.  ... 
doi:10.1587/transfun.e99.a.1591 fatcat:zhee4jhgdzdsvhudln3dccghai

A Secure M + 1st Price Auction Protocol Based on Bit Slice Circuits [chapter]

Takuho Mistunaga, Yoshifumi Manabe, Tatsuaki Okamoto
2011 Lecture Notes in Computer Science  
We apply the Boneh-Goh-Nissim encryption to the mix-and-match protocol to reduce the computation costs.  ...  Conclusion We introduced new efficient secure M + 1st price auction protocols based on the mix-and-match protocol and the BGN encryption.  ...  As a topic of future work, we will try to compose a secure auction protocol without using the mix-and-match protocol.  ... 
doi:10.1007/978-3-642-25141-2_4 fatcat:h7qaxjmuerfspcnflh4g5i4kx4

Secure Mobile Commerce in Ad hoc Network Using CAEC2M

Khaleel Ahmad, Shoaib Alam, M A Rizvi
2016 International Journal of Future Generation Communication and Networking  
An attempt is made to design a mix-network (Mix-Net) using elliptic curve cryptography based on cellular automata which creates a hard to trace communication to protect the anonymity of the sender and  ...  encrypt the sensitive information to avoid any eavesdropper trying to access the data during transmission.  ...  Doublas Wikstrom discussed about a sender verifiable Mix-Net protocol and also a new proof a shuffle. Also introduced first El Gamal based Mix-Net in which re-encryption is not required.  ... 
doi:10.14257/ijfgcn.2016.9.12.18 fatcat:fgjcv5zjjzbcpbzzaaabsvjv7a

Lattice Based Universal Re-encryption for Mixnet

Kunwar Singh, C. Pandu Rangan, A. K. Banerjee
2014 Journal of Internet Services and Information Security  
In this paper we present universal re-encryption scheme under learning with error (LWE) assumption based on [9] .  ...  In 2004, Golle et al [10] presented a new primitive called universal re-encryption based on the Elgamal public key cryptosystem.  ...  Acknowledgments We would like to thank one of the anonymous reviewers for pointing out a mistake in our scheme.  ... 
doi:10.22667/jisis.2014.02.31.001 dblp:journals/jisis/SinghRB14 fatcat:krbvi5egwratjeibgcg5uvho2a

Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation

Oleg Mazonka, Nektarios Georgios Tsoutsos, Michail Maniatakos
2016 IEEE Transactions on Information Forensics and Security  
Leveraging the power of encryption, in this paper we introduce Cryptoleq: an abstract machine based on the concept of One Instruction Set Computer, capable of performing general-purpose computation on  ...  Cryptoleq is heterogeneous, allowing mixing encrypted and unencrypted instruction operands in the same program memory space.  ...  To actually break the barrier between the encrypted and unencrypted domains, mixing open and encrypted values, obfuscated decryption and re-encryption capabilities can be used (section IV-B).  ... 
doi:10.1109/tifs.2016.2569062 fatcat:n2jztvxbfneaxac73enzkmrqgy

Privacy and verifiability in voting systems: Methods, developments and trends

Hugo Jonker, Sjouke Mauw, Jun Pang
2013 Computer Science Review  
On the one hand, privacy requires that a vote cannot be traced back from the result to a voter, while on the other hand, verifiability states that a voter can trace the effect of her vote on the result  ...  One of the most challenging aspects in computer-supported voting is to combine the apparently conflicting requirements of privacy and verifiability.  ...  In addition, we are grateful for comments on early drafts of this work by Peter Y. A.  ... 
doi:10.1016/j.cosrev.2013.08.002 fatcat:fjqritngvnej3owtqnmhbuckqa

Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme

Jurlind Budurushi, Stephan Neumann, Maina M. Olembo, Melanie Volkamer
2013 2013 International Conference on Availability, Reliability and Security  
While these schemes are all based on different security models, most of these models are not adequate for high-stake elections.  ...  the only scheme that also satisfies the proposed security model.  ...  A verifiable re-encryption mix-net consists of the cryptographic algorithms re-encryption, permutation, and zero-knowledge proofs.  ... 
doi:10.1109/ares.2013.27 dblp:conf/IEEEares/BudurushiNOV13 fatcat:7mam4k6kgbeuhjh7mwthosz3li

Survey on anonymous communications in computer networks

Jian Ren, Jie Wu
2010 Computer Communications  
Finally, we consider a universal re-encryption technique that permits universal re-encryption of the ciphertexts [92] .  ...  This scheme relies on a new public-key re-encryption primitive to eliminate the requirement of the public key.  ... 
doi:10.1016/j.comcom.2009.11.009 fatcat:4ux4n767pvaujpnsnkgiytqikq

Securing Abe's Mix-Net Against Malicious Verifiers via Witness Indistinguishability [chapter]

Elette Boyle, Saleet Klein, Alon Rosen, Gil Segev
2018 Lecture Notes in Computer Science  
We instantiate our framework with two variants of Abe's mix-net. In the first variant, ElGamal ciphertexts are replaced by an alternative, yet comparably efficient, "lossy" encryption scheme.  ...  Finally, we demonstrate cases in Abe's original mix-net (without modification) where only one witness exists, such that if the WI proof leaks information on the (single) witness in these cases, then the  ...  and/or assume anything about the encryption scheme in use (beyond it being re-randomizable).  ... 
doi:10.1007/978-3-319-98113-0_15 fatcat:ta7ysaxvebbpzjbsdnlbm2jljq

Concurrent error detection of fault-based side-channel cryptanalysis of 128-bit symmetric block ciphers

Ramesh Karri, Kaijie Wu, Piyush Mishra, Yongkook Kim
2001 Proceedings of the 38th conference on Design automation - DAC '01  
Fault-based side-channel cryptanalysis Soon after the first attack by Boneh et. al. a University of Singapore team proposed a fault-based attack against tamperproof RSA devices based on two fault models  ...  In this paper we investigate systematic approaches to low-cost, low-latency CED for symmetric encryption algorithms based on the inverse relationship that exists between encryption and decryption at algorithm  ...  Wolter et. al. developed two CED schemes for IDEA based on information and time redundancy respectively [15] .  ... 
doi:10.1145/378239.379027 dblp:conf/dac/KarriWMK01 fatcat:lpwyylnajngr3np343tque3vfq

Filling the gap between voters and cryptography in e-voting

Wei Han, Dong Zheng, Ke-fei Chen
2009 Journal of Shanghai Jiaotong University (Science)  
It combines the advantages of Moran-Naor's voting scheme and voting schemes based on homomorphic encryption.  ...  Voting based on blind signature is not universal verifiable, but the other two categories of voting protocols satisfy the universal verifiability.  ...  The cryptographic e-voting schemes can be mainly classified into three categories: voting based on anonymous channels such as mix-net [1] [2] [3] , voting based on blind signature [4] and voting based  ... 
doi:10.1007/s12204-009-0257-2 fatcat:75ndee3d7vduflkhdrurkarphi

Deduplication on Encrypted Big Data in Cloud

Zheng Yan, Wenxiu Ding, Xixun Yu, Haiqi Zhu, Robert H. Deng
2016 IEEE Transactions on Big Data  
In this paper, we propose a scheme to deduplicate encrypted data stored in cloud based on ownership challenge and proxy re-encryption. It integrates cloud data deduplication with access control.  ...  Traditional deduplication schemes cannot work on encrypted data. Existing solutions of encrypted data deduplication suffer from security weakness.  ...  In this paper, we propose a scheme based on data ownership challenge and Proxy Re-Encryption (PRE) to manage encrypted data storage with deduplication.  ... 
doi:10.1109/tbdata.2016.2587659 fatcat:wpfdm3jlljc3vlfoalfxko5apy

Study of Algorithms for Securing Data Stored in Cloud

Mrs. K. Vidhya M.E
2016 INTERNATIONAL JOURNAL OF EMERGING TRENDS IN SCIENCE AND TECHNOLOGY  
Various encryption schemes have been proposed to secure the cloud storage. However, most work focuses on the data privacy and the access control.  ...  In this paper, we discuss a many techniques which are used to provide security in the field of cloud computing and are compared based on their performance, pros and cons.  ...  In modern block ciphers there were four transformations: 1) substitution, 2) permutation, 3) mixing and 4) keyadding.  ... 
doi:10.18535/ijetst/v3i04.01 fatcat:qcmhub2zfra65jpfoso4d2ib7q
« Previous Showing results 1 — 15 out of 4,507 results