Filters








268 Hits in 8.7 sec

Post-Quantum Secure Remote Password Protocol from RLWE Problem [chapter]

Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li
2018 Lecture Notes in Computer Science  
Secure Remote Password (SRP) protocol is an augmented Password-based Authenticated Key Exchange (PAKE) protocol based on discrete logarithm problem (DLP) with various attractive security features.  ...  An important line of key exchange protocols that can defeat such attack is authenticated key exchange (AKE).  ...  These are major advantages of SRP compared with other PAKE protocols. SRP is also a key exchange protocol which provides mutual authentication and forward secrecy.  ... 
doi:10.1007/978-3-319-75160-3_8 fatcat:aboktgxcmvghrmxaespm4wnpbe

A Lattice-Based Group Authentication Scheme

Jheng-Jia Huang, Yi-Fan Tseng, Qi-Liang Yang, Chun-I Fan
2018 Applied Sciences  
Moreover, compared with the existing lattice-based authentication schemes, ours provides the most efficient method to agree upon a session key among a group of users after mutual authentication.  ...  To the best of our knowledge, the existing lattice-based authentication schemes are based on a lattice-based public key encryption called NTRU: a ring-based public key cryptosystem, proposed by Hoffstein  ...  Compared with the existing lattice-based authentication schemes, our scheme provides the most efficient authentication protocol in terms of the total cost to generate a session key among a group of users  ... 
doi:10.3390/app8060987 fatcat:azf7sztdzvbflihqsuioy3paae

FPGA-based Digital Quantum Coprocessor

Valerii Hlukhov, Lviv Polytechnic National University, Computer Engineering Department, Bohdan Havano
2018 Advances in Cyber-Physical Systems  
NTRU: A type of lattice based cryptographic public key cipher.  ...  Key Agreement: A type of algorithm, based on public key cryptography, that allows two remote parties to each exchange some information publicly, that can be intercepted by anyone, and then privately compute  ...  Analysis of current TLS ciphersuites The handshake sub-protocol is used to perform authentication and establish shared secret keys.  ... 
doi:10.23939/acps2018.02.067 fatcat:7txboogyr5f5vgc5c5zzbovv34

Privacy, Discovery, and Authentication for the Internet of Things [article]

David J. Wu and Ankur Taly and Asim Shankar and Dan Boneh
2017 arXiv   pre-print
Our protocols provide private and authentic service advertisements, zero round-trip (0-RTT) mutual authentication, and are provably secure in the Canetti-Krawczyk key-exchange model.  ...  In contrast to alternatives, our protocols are lightweight and require minimal modification to existing key-exchange protocols.  ...  We thank Bruno Blanchet for his help in verifying the unlinkability property of our modified private mutual authentication protocol in Section 4.  ... 
arXiv:1604.06959v3 fatcat:45marxb3xzekflyu35yx2b3uay

Soft Constraints for Security

Giampaolo Bella, Stefano Bistarelli, Simon N. Foley
2006 Electronical Notes in Theoretical Computer Science  
; a principal can achieve different levels of authentication with different principals.  ...  They allow for a number of participating principals, and consist of sets of rules controlling the actions that principals should or should not perform.  ...  protocol runs under study are compared with an ideal run without spies.  ... 
doi:10.1016/j.entcs.2005.07.011 fatcat:p7klhll76ng7vgn36rubgbzxma

The Whole is Less Than the Sum of Its Parts: Constructing More Efficient Lattice-Based AKEs [chapter]

Rafael del Pino, Vadim Lyubashevsky, David Pointcheval
2016 Lecture Notes in Computer Science  
Authenticated Key Exchange (AKE) is the backbone of internet security protocols such as TLS and IKE.  ...  This is advantageous when signing relatively long messages, such as the public keys and ciphertexts generated by a lattice-based KEM.  ...  A's knowledge of the signature key of Party 1 has no incidence on this proof. This implies that an active adversary will cause an abort before the third flow.  ... 
doi:10.1007/978-3-319-44618-9_15 fatcat:s6dxf2ab2vhsnnvugfimschovu

Authenticating Privately over Public Wi-Fi Hotspots

Aldo Cassola, Erik-Oliver Blass, Guevara Noubir
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
In this work we lay out the operation of our protocol in detail, its security analysis, and propose an implementation compatible with the Wi-Fi Extensible Authentication Protocol (EAP) along with optimizations  ...  Our protocol is based on Private Information Retrieval (PIR) with an augmented cheating detection mechanism based on our extensions to the NTRU encryption scheme.  ...  ACKNOWLEDGEMENTS This material is based upon work supported by the National Science Foundation under Grant No. CNS #1218197.  ... 
doi:10.1145/2810103.2813647 dblp:conf/ccs/CassolaBN15 fatcat:o7sczhletvd53arl3dqwozda2i

A Survey of Security in SCADA Networks: Current Issues and Future Challenges

Sagarika Ghosh, Srinivas Sampalli
2019 IEEE Access  
The paper provides a classification of attacks based on security requirements and network protocol layers.  ...  The primary objective of this survey paper is to provide a comparative study of the on-going security research in SCADA systems.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their valuable feedback and comments, which have substantially improved the quality of the paper.  ... 
doi:10.1109/access.2019.2926441 fatcat:nrn3z727azhi5dmpr2ub6tbqum

Privacy through pseudonymity in user-adaptive systems

Alfred Kobsa, Jörg Schreck
2003 ACM Transactions on Internet Technology  
User-adaptive applications cater to the needs of each individual computer user, taking for example users' interests, level of expertise, preferences, perceptual and motoric abilities, and the usage environment  ...  Both is in conflict with users' privacy concerns that became manifest in numerous recent consumer polls, and with data protection laws and guidelines that call for parsimony, purpose-orientation, and user  ...  ACKNOWLEDGMENTS We would like to thank Lorrie Cranor, Günter Pernul, Gene Tsudik, and the three anonymous TOIT reviewers for their valuable comments on an earlier version of this article.  ... 
doi:10.1145/767193.767196 fatcat:2qbotspjbnd7nnstvkwuqvd75m

ROTed: Random Oblivious Transfer for embedded devices

P. Branco, L. Fiolhais, M. Goulão, P. Martins, P. Mateus, L. Sousa
2021 Transactions on Cryptographic Hardware and Embedded Systems  
The security of the protocol is based on the Ring Learning With Errors assumption (for which no quantum solver is known).  ...  From a memory footprint perspective, there is a small increase (16%) when compared to the state-of-the-art.  ...  Performance-wise, it is shown, through extensive experimental evaluation, that the proposed ROT compares favourably to the state-of-the-art OTs, based on RLWE and ECC.  ... 
doi:10.46586/tches.v2021.i4.215-238 fatcat:3msirbrigvhsjkcm4fnmjvoto4

A new spin on quantum cryptography: Avoiding trapdoors and embracing public keys [article]

Lawrence M. Ioannou, Michele Mosca
2011 arXiv   pre-print
We give new arguments in support of signed quantum key establishment, where quantum cryptography is used in a public-key infrastructure that provides the required authentication.  ...  We also analyze more thoroughly than previous works the benefits that quantum key establishment protocols have over certain classical protocols, motivated in part by the various objections to quantum key  ...  It includes authenticated key transport protocols based on public-key encryption (but not those based on symmetric-key encryption); more generally, it includes the "authenticated version" of any quantum-resistant  ... 
arXiv:1109.3235v1 fatcat:ym5by4kuuvdqdfwpwnn4c2zqpe

Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis [article]

Carlton Shepherd, Konstantinos Markantonakis, Nico van Heijningen, Driss Aboulkassimi, Clément Gaine, Thibaut Heckmann, David Naccache
2021 arXiv   pre-print
We evaluate the prevailing methods, compare existing attacks using a common set of criteria, identify several challenges and shortcomings, and suggest future directions of research.  ...  Today's mobile devices contain densely packaged system-on-chips (SoCs) with multi-core, high-frequency CPUs and complex pipelines.  ...  The authors would like to thank the EXFILES WP5 project partners for comments and discussions around the topic of this work.  ... 
arXiv:2105.04454v5 fatcat:27ldfag7ejgvxh7cbs2qnevb24

Efficient and Secure ECDSA Algorithm and its Applications: A Survey [article]

Mishall Al-Zubaidie, Zhongwei Zhang, Ji Zhang
2019 arXiv   pre-print
This paper presents detailed and a comprehensive survey of an update of the ECDSA algorithm in terms of performance, security, and applications.  ...  of the constrained source and large systems.  ...  Acknowledgements We would like to acknowledge and thank the efforts of Dr. Barbara Harmes, and Hawa Bahedh as well as the valuable feedback of the reviewers.  ... 
arXiv:1902.10313v1 fatcat:7k44pfghujbzdmoxpkynavzone

Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications

Mohammad Kamrul Hasan, Shayla Islam, Rossilawati Sulaiman, Sheroz Khan, Aisha-Hassan Abdalla Hashim, Shabana Habib, Mohammad Islam, Saleh Alyahya, Musse Mohamed Ahmed, Samar Kamil, Md Arif Hassan
2021 IEEE Access  
Numerous test images have been used to determine the performance of the proposed algorithm.  ...  The proposed technique is analyzed, evaluated, and then compared to conventionally encrypted ones in security and execution time.  ...  Some of the key performance depend on encryption quality, crypto-analysis, memory requirement, execution time [4] , [8] , [32] , [33] , [34] .  ... 
doi:10.1109/access.2021.3061710 fatcat:4srvky4gengk5adew7rmirmokq

Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems

Vijay Prakash, Alex Williams, Lalit Garg, Claudio Savaglio, Seema Bawa
2021 Electronics  
This paper seeks to establish an in-depth understanding of the impact of Cloud and Edge computing-based environmental factors.  ...  The complexity of the Cloud and Edge environments and their key features present many technical challenges from multiple stakeholders.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics10111229 fatcat:mkutuyvfinhajcmpymcc57zrka
« Previous Showing results 1 — 15 out of 268 results