70 Hits in 4.8 sec


2011 Proceedings of the International Conference on Security and Cryptography   unpublished
encryption scheme based on multiplicative groups (without bilinear pairing) by Sun et al. [18] and the RSA based CPA secure certificateless encryption scheme by Lai et al. [11].  ...  In this paper, we present two novel and completely different RSA based adaptive chosen ciphertext secure (CCA2) certificateless encryption schemes.  ...  They have proved their scheme secure against chosen plaintext attack (CPA). In fact they left the design of a CCA secure system based on RSA as open.  ... 
doi:10.5220/0003529502080217 fatcat:2jcha4gudvdbblzcmvye3kl6ke

A Security-Mediated Encryption Scheme Based on ElGamal Variant

Boon Chian Tea, Muhammad Rezal Kamel Ariffin, Amir Hamzah Abd. Ghafar, Muhammad Asyraf Asbullah
2021 Mathematics  
In this paper, a pairing-free security mediated encryption scheme based on an ElGamal variant is proposed.  ...  We show that the proposed security mediated encryption scheme is secure indistinguishably against chosen-ciphertext attack (IND-CCA) in the random oracle via the hardness assumption of the computational  ...  In this paper, we propose a new security mediated encryption scheme based on an IND-CCA secure ElGamal variant.  ... 
doi:10.3390/math9212642 fatcat:yigaq2gmbfgtfoiqgegx3l3y6y

Certificateless Proxy Reencryption Scheme (CPRES) Based on Hyperelliptic Curve for Access Control in Content-Centric Network (CCN)

Zahid Ullah, Asim Zeb, Insaf Ullah, Khalid Mahmood Awan, Yousaf Saeed, M. Irfan Uddin, Mahmoud Ahmad Al-Khasawneh, Marwan Mahmoud, Mahdi Zareei
2020 Mobile Information Systems  
To provide the previously mentioned services, this paper presents a certificateless proxy reencryption scheme (CPRES) based on the hyperelliptic curve for access control in the content-centric network  ...  The simulation results show that the proposed scheme provides secure access to content during end-to-end communication.  ...  [25] proposed another CL-PRE scheme in 2015 for data distributing in cloud and compared its security with CCA based on the strong security model.  ... 
doi:10.1155/2020/4138516 doaj:d87359eaa11f44dfb37ed31a83524b6f fatcat:z6dt2zqvhnda5frzkgn7gkgn7u

Certificateless Public Key Encryption Scheme with Hybrid Problems and Its Application to Internet of Things

Rui Guo, Qiaoyan Wen, Huixian Shi, Zhengping Jin, Hua Zhang
2014 Mathematical Problems in Engineering  
In this paper, we present a novel certificateless public key encryption scheme on the elliptic curve over the ring, whose security is based on the hardness assumption of Bilinear Diffie-Hellman problem  ...  In addition, based on our encryption system, we also propose a protocol to protect the confidentiality and integrity of information in the scenario of Internet of Things with constrained resource nodes  ...  's scheme [14] whose security is only based on the problem of factoring the large number as in RSA.  ... 
doi:10.1155/2014/980274 fatcat:6eucgdfumrddtmqn7kcrs7qzj4

Security-Mediated Certificateless Cryptography [chapter]

Sherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto
2006 Lecture Notes in Computer Science  
Our concrete scheme is more efficient than the identity-based mediated encryption scheme of Baek and Zheng in PKC 2004 which is provably secure in a comparable security model.  ...  We present a generic construction and also a concrete algorithm based on bilinear pairings.  ...  He is grateful to his coauthors for offering this on-going project, and anonymous reviewers for helpful comments and the suggestion about generic construction in particular.  ... 
doi:10.1007/11745853_33 fatcat:m2t7rq2zyvdtbp3hjd6cfw4riu

Fully Non-interactive Onion Routing with Forward-Secrecy [chapter]

Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro, Orazio Puglisi
2011 Lecture Notes in Computer Science  
Our solution is based on the application of forward-secure encryption.  ...  We design a forward-secure encryption scheme (of independent interest) to be used as the main encryption scheme in an onion routing protocol.  ...  Certificateless and PKI Variants The onion routing scheme we presented in Section 3, uses an identity-based forward-secure encryption for the routers.  ... 
doi:10.1007/978-3-642-21554-4_15 fatcat:jqh6slxzovhmxfyxd5wsh47upe

Fully non-interactive onion routing with forward secrecy

Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro, Orazio Puglisi
2012 International Journal of Information Security  
Our solution is based on the application of forward-secure encryption.  ...  We design a forward-secure encryption scheme (of independent interest) to be used as the main encryption scheme in an onion routing protocol.  ...  Certificateless and PKI Variants The onion routing scheme we presented in Section 3, uses an identity-based forward-secure encryption for the routers.  ... 
doi:10.1007/s10207-012-0185-2 fatcat:5xurrrfsrjhsxc34wallnif6ee


Nur Nabila Mohamed, Yusnani Mohd Yussof, Mohammed Ahmed Saleh, Habibah Hashim
2020 Journal of Information and Communication Technology  
On the other hand the asymmetric scheme solves the secret key distribution issue; yet the standalone technique is slow and consumes more computer resources compared to the symmetric encryption.  ...  For instance, symmetric encryption method provides a costeffective technique of securing data without compromising security. However, sharing the secret key is a vital problem.  ...  Amandeep (2016) presented a new hybrid scheme based on Fibonacci series, XOR cipher, PN sequence, RSA, Hill cipher, one bit LSB, two bit LSB and three bit LSB.  ... 
doi:10.32890/jict2020.19.3.1 fatcat:dnur6fbzvve4jockrantiqwd5q

New Construction of PVPKE Scheme and Its Application in Information Systems and Mobile Communication

Minqing Zhang, Xu An Wang, Xiaoyuan Yang, Weihua Li
2015 Mobile Information Systems  
In this paper, we give new constructions ofPVPKEscheme based on signed quadratic residues and analyze their security.  ...  Independently, we introduced a new cryptographic primitive, CCA-secure publicly verifiable public key encryption without pairings in the standard model (PVPKE), and discussed its application in proxy reencryption  ...  based on signed quadratic residues is IND-CCA-secure.  ... 
doi:10.1155/2015/430797 fatcat:ptn2r6txrfhthluhw66z2cziba

Generic Constructions of Identity-Based and Certificateless KEMs

K. Bentahar, P. Farshim, J. Malone-Lee, N. P. Smart
2007 Journal of Cryptology  
We extend the concept of key encapsulation mechanisms to the primitives of ID-based and certificateless encryption.  ...  We show that the natural combination of ID-KEMs or CL-KEMs with data encapsulation mechanisms results in encryption schemes which are secure in a strong sense.  ...  Acknowledgements The authors would like to offer their thanks to Alex Dent and Kenny Paterson for providing detailed and insightful comments on an earlier version of this work.  ... 
doi:10.1007/s00145-007-9000-z fatcat:7hw622oolrazdcgjyi46bq3cxa

Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains

Tzung-Her Chen, Ting-Le Zhu, Fuh-Gwo Jeng, Chien-Lung Wang, Kaitai Liang
2021 Security and Communication Networks  
Upon evaluating the operational cost in real currency based on Ethereum, the experimental results demonstrate that the proposed scheme only requires a small cost as a fee.  ...  The proposed provably secure signcryption scheme implements a designated recipient beforehand such that a sender can cryptographically facilitate the interoperation on the blockchain information with the  ...  ECC-224) provides comparable security to RSA-3072 (resp. RSA-2048) [36] .  ... 
doi:10.1155/2021/6637402 fatcat:yo2yqkh4lbcenpug3aw223nxju


S.I Shaik Hussain, V Yuvaraj
2015 International Journal on Information Sciences and Computing  
Finally authorized users decrypt the same encrypted information from the public cloud. This technique has greater performance and security than the earlier one.  ...  Cloud security is one of the most important ongoing research, technology of the day to day life where the information stored in the cloud must be restricted to the unauthorized users and also it can be  ...  Thus the IND-CCA secure provides probabilistic polynomial time to solve the particular problem in the certificateless public key encryption scheme [9] .  ... 
doi:10.18000/ijisac.50149 fatcat:gtyadfjobnhz5ofqlgxmfkrvka

A survey of certificateless encryption schemes and security models

Alexander W. Dent
2008 International Journal of Information Security  
scheme or an identity-based encryption scheme).  ...  We also survey all known certificateless encryption schemes and point out that there are no known certificateless encryption schemes that achieve the highest levels of security without using the random  ...  Acknowledgements The author is indebted to the provable security working group in ECRYPT's AZTEC lab for their help in discussing the topics of this paper.  ... 
doi:10.1007/s10207-008-0055-0 fatcat:5f26gjykwfex3bq7p2dfhp7hke

Efficient Certificateless Public Key Cryptography with Equality Test for Internet of Vehicles

Rashad Elhabob, Yanan Zhao, Iva Sella, Hu Xiong
2019 IEEE Access  
In this scheme, the authorized cloud server has the permission to execute the equality test on encrypted data and retrieve the result without knowing any relevant information about the ciphertext.  ...  Therefore, we assert that our scheme is ideal for deployment in both the cloud and IoV environments. INDEX TERMS Internet of Vehicles (IoV), cloud, certificateless, equality test.  ...  Furthermore, we demonstrate the security of our scheme based on the OW-CCA and IND-CCA in the random oracle model assuming the mBDHI problem is intractable.  ... 
doi:10.1109/access.2019.2917326 fatcat:gicygksbqjcpzmvnmo6ckp3rpm

Provably secure certificateless encryption scheme in the standard model

2020 KSII Transactions on Internet and Information Systems  
Recently, numerous certificateless encryption (CLE) schemes have been introduced. The security proofs of most schemes are given under the random oracle model (ROM).  ...  Currently, there is only one scheme that was proved to be secure in SM. In this paper, we constructed a new CLE scheme and gave the security proofs in SM.  ...  [20] put forward a common means to design CLE schemes with provably security in SM against CCAs, which come from a secure identity-based encryption scheme against chosen-plaintext attacks (CPAs).  ... 
doi:10.3837/tiis.2020.06.012 fatcat:a6arrplcz5fdzbuqjneb2xwffq
« Previous Showing results 1 — 15 out of 70 results