A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution
[chapter]
2006
Lecture Notes in Computer Science
In this work we describe our efforts in developing a deployable secure mailing list solution based on proxy encryption techniques. ...
Proxy encryption schemes transform cipher-text from one key to another without revealing the plain-text. ...
Acknowledgements We would like to thank Jim Basney and Von Welch for their comments and suggestions, which greatly improved the design and development of PSELS. ...
doi:10.1007/11935308_19
fatcat:4lsa7eu245dotgu6ebenvqpxqi
Methodology for designing cryptographic systems with advanced functionality based on a modular approach
モジュール化に基づく高機能暗号の設計
2014
Synthesiology English edition
モジュール化に基づく高機能暗号の設計
We take proxy re-encryption as an example, and discuss how the barrier to user understanding is reduced by our proposed methodology. ...
Furthermore, this fact may prevent these new technologies from being introduced into real world systems. We propose a new methodology for overcoming this barrier. ...
Clues to the solution might be found in a task to unravel the complexity. ...
doi:10.5571/syntheng.7.92
fatcat:4shho5nyy5g3fidnjdt5hopxxq
Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server
2017
IEEE Access
For example, an e-mail receiver can re-transfer an encrypted e-mail to his secretary while allowing the e-mail to be readable for her. ...
For example, an e-mail receiver can re-transfer an encrypted e-mail to his secretary while allowing the e-mail to be readable for her. ...
For example, a ciphertext might not be re-encrypted from user i to j, and then be re-encrypted again from user j to k and so forth. ...
doi:10.1109/access.2017.2771335
fatcat:i2berlgkmvfjlf4nuzujyec2ji
Post-Quantum Era Privacy Protection for Intelligent Infrastructures
2021
IEEE Access
A practical case study on the Internet of Vehicles (IoV) is presented to demonstrate how PETs can be applied in reality. ...
With billions of connected devices spanning continents through interconnected networks, security and privacy protection techniques for the emerging II services become a paramount concern. ...
These threats are crucial, especially from long-term security and privacy perspectives, and therefore, they should be averted, already nowadays, by the deployment of PQC solutions. • Long term secure digital ...
doi:10.1109/access.2021.3062201
fatcat:kqcwwqjfjnds7bzlrid7r6gjlu
Secure Free-Floating Car Sharing for Offline Cars
2017
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy - CODASPY '17
To demonstrate such a flexibility, we present a platform security concept which can be instantiated in various deployment options and provides the means to achieve best possible security given available ...
We implemented our solution on Android and instantiated the platform security concept in three different deployment options. We evaluate security of our solution and report performance measurements. ...
to a broad security community are more likely to suffer from vulnerabilities. ...
doi:10.1145/3029806.3029807
dblp:conf/codaspy/DmitrienkoP17
fatcat:iiadgjz6e5gotm4y7r7s43oxki
Searchitect - A Developer Framework for Hybrid Searchable Encryption (Position Paper)
2018
Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security
Searchable encryption (SE) allows to outsource data to the cloud in a secure way, whilst permitting search functionality on that encrypted data: the host is able to perform search queries on behalf of ...
It aims at developers keeping track of recent SE developments, providing an easy deployable solution for testing in public and private clouds. ...
The client uses its key material to extract the plaintext list of matching document ids from the encrypted search reply, handing it over to the application. ...
doi:10.5220/0006789402910298
dblp:conf/iotbd/HabockKKST18
fatcat:fxijy5qjebdh7i72f6lwng7mcu
Survey on Remote Electronic Voting
[article]
2017
arXiv
pre-print
In this survey we try to give a brief and precise overview and summary of the current situation. ...
Electronic and remote voting has become a large field of research and brought forth a multiplicity of schemes, systems, cryptographic primitives as well as formal definitions and requirements for electronic ...
After the voter makes her voting decisions, her choices are encrypted with the public keys from the TC and the SC and send through the proxy servers to TC and SC. ...
arXiv:1702.02798v1
fatcat:3cgqjsovonelne4s3nrko6bui4
Peace vs. Privacy
2015
Proceedings of the New Security Paradigms Workshop on ZZZ - NSPW '15
CherAmi is a client-end solution and does not require changes to email or OSN servers. ...
In this paper, the focus of our discussion includes: the paradigm of security through hostility, and the design, implementation and security analysis of the proposed encrypted email solution. ...
NSPW 2015, and members of Concordia's Madiba Security Research Group; we thank them all. ...
doi:10.1145/2841113.2841123
dblp:conf/nspw/MannanSPR15
fatcat:tkwlv5z4ajf5bj4olnsu4exngq
Architecture For Data Management
2015
Zenodo
We survey security and dependability technologies and discuss designs for the overall unifying architecture for data management that serves as an umbrella for different security and dependability data ...
Specifically the document lays out the architecture for data privacy, secure sharing schemes, geo-replication and fault and disaster tolerance for SUPERCLOUD data management. ...
patterns may reveal up to 80% of search queries on an encrypted e-mail database [101] . ...
doi:10.5281/zenodo.49788
fatcat:5oup2d7sk5dm7efj77pjvg2bru
Survey on Identity based and Hierarchical Identity based Encryption Schemes
2016
International Journal of Computer Applications
We also discuss Revocable Identity Based Encryption (RIBE) schemes from the view point of security models and constructions. ...
In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptography (IBC) and their security implications with applications. ...
A collection of cryptographic primitives used to provide security services is called cryptosystem. ...
doi:10.5120/ijca2016908158
fatcat:spjqzcascfe33djkrhcg3ej4mu
DisCo: middleware for securely deploying decomposable services in partly trusted environments
2004
24th International Conference on Distributed Computing Systems, 2004. Proceedings.
DisCo is an umbrella infrastructure, comprised of a set of independent but highly interoperable core components and abstractions, intended to provide programmers with a more complete solution to the problem ...
Consumers of these services must be able to discover, securely acquire the code for, and install service components over the network with only minimal a priori knowledge of their locations. ...
The code for the secure mail service had a larger deployment component. ...
doi:10.1109/icdcs.2004.1281616
dblp:conf/icdcs/FreudenthalK04
fatcat:l6iu36nwtzhcfpl3bn4bgwlvha
CloudKeyBank: Privacy and owner authorization enforced key management framework
2016
2016 IEEE 32nd International Conference on Data Engineering (ICDE)
To implement CloudKeyBank efficiently, we propose a new cryptographic primitive named Searchable Conditional Proxy Re-Encryption (SC-PRE) which combines the techniques of Hidden Vector Encryption (HVE) ...
and Proxy Re-Encryption (PRE) seamlessly, and propose a concrete SC-PRE scheme based on existing HVE and PRE schemes. ...
how to combine HVE and PRE seamlessly from the cryptography theory and security. ...
doi:10.1109/icde.2016.7498383
dblp:conf/icde/TianHWWZ16
fatcat:rzzwlkzvtfbi5awbxrpnscdww4
CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework
2015
IEEE Transactions on Knowledge and Data Engineering
To implement CloudKeyBank efficiently, we propose a new cryptographic primitive named Searchable Conditional Proxy Re-Encryption (SC-PRE) which combines the techniques of Hidden Vector Encryption (HVE) ...
and Proxy Re-Encryption (PRE) seamlessly, and propose a concrete SC-PRE scheme based on existing HVE and PRE schemes. ...
how to combine HVE and PRE seamlessly from the cryptography theory and security. ...
doi:10.1109/tkde.2015.2457903
fatcat:qe2qu2xlhrhdrosnpmvldmapnq
The middlebox manifesto
2011
Proceedings of the 10th ACM Workshop on Hot Topics in Networks - HotNets '11
Most network deployments respond to changing application, workload, and policy requirements via the deployment of specialized network appliances or "middleboxes". ...
To this end, our vision is a world with software-centric middlebox implementations running on general-purpose hardware platforms that are managed via open and extensible management APIs. ...
To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. hardware such as x86 CPUs [20, 22, 10] , GPUs [15] , FP-GAs [13] and ...
doi:10.1145/2070562.2070583
dblp:conf/hotnets/SekarRRES11
fatcat:ubg7xaxa3bguzakghr2k6aateu
Attestation Transparency
2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16
Combined, this creates a platform that allows legacy clients to obtain security guarantees about Internet services. ...
Internet services can provide a wealth of functionality, yet their usage raises privacy, security and integrity concerns for users. ...
This work was supported by Intel through the ISTC for Secure Computing, AFOSR under MURI award FA9550-12-1-0040, and NSF under CCF-0424422. ...
doi:10.1145/2897845.2897895
dblp:conf/ccs/BeekmanMW16
fatcat:tfcnuuch2ramplztvrn2tglkyu
« Previous
Showing results 1 — 15 out of 655 results