Filters








655 Hits in 5.8 sec

From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution [chapter]

Himanshu Khurana, Jin Heo, Meenal Pant
2006 Lecture Notes in Computer Science  
In this work we describe our efforts in developing a deployable secure mailing list solution based on proxy encryption techniques.  ...  Proxy encryption schemes transform cipher-text from one key to another without revealing the plain-text.  ...  Acknowledgements We would like to thank Jim Basney and Von Welch for their comments and suggestions, which greatly improved the design and development of PSELS.  ... 
doi:10.1007/11935308_19 fatcat:4lsa7eu245dotgu6ebenvqpxqi

Methodology for designing cryptographic systems with advanced functionality based on a modular approach
モジュール化に基づく高機能暗号の設計

Goichiro HANAOKA, Satsuya OHATA, Takahiro MATSUDA, Koji NUIDA, Nuttapong ATTRAPADUNG
2014 Synthesiology English edition  
We take proxy re-encryption as an example, and discuss how the barrier to user understanding is reduced by our proposed methodology.  ...  Furthermore, this fact may prevent these new technologies from being introduced into real world systems. We propose a new methodology for overcoming this barrier.  ...  Clues to the solution might be found in a task to unravel the complexity.  ... 
doi:10.5571/syntheng.7.92 fatcat:4shho5nyy5g3fidnjdt5hopxxq

Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server

Mingwu Zhang, Yan Jiang, Yi Mu, Willy Susilo
2017 IEEE Access  
For example, an e-mail receiver can re-transfer an encrypted e-mail to his secretary while allowing the e-mail to be readable for her.  ...  For example, an e-mail receiver can re-transfer an encrypted e-mail to his secretary while allowing the e-mail to be readable for her.  ...  For example, a ciphertext might not be re-encrypted from user i to j, and then be re-encrypted again from user j to k and so forth.  ... 
doi:10.1109/access.2017.2771335 fatcat:i2berlgkmvfjlf4nuzujyec2ji

Post-Quantum Era Privacy Protection for Intelligent Infrastructures

Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, Raimundas Matulevicius, Abasi-amefon O. Affia, Maryline Laurent, Nazatul Haque Sultan, Qiang Tang
2021 IEEE Access  
A practical case study on the Internet of Vehicles (IoV) is presented to demonstrate how PETs can be applied in reality.  ...  With billions of connected devices spanning continents through interconnected networks, security and privacy protection techniques for the emerging II services become a paramount concern.  ...  These threats are crucial, especially from long-term security and privacy perspectives, and therefore, they should be averted, already nowadays, by the deployment of PQC solutions. • Long term secure digital  ... 
doi:10.1109/access.2021.3062201 fatcat:kqcwwqjfjnds7bzlrid7r6gjlu

Secure Free-Floating Car Sharing for Offline Cars

Alexandra Dmitrienko, Christian Plappert
2017 Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy - CODASPY '17  
To demonstrate such a flexibility, we present a platform security concept which can be instantiated in various deployment options and provides the means to achieve best possible security given available  ...  We implemented our solution on Android and instantiated the platform security concept in three different deployment options. We evaluate security of our solution and report performance measurements.  ...  to a broad security community are more likely to suffer from vulnerabilities.  ... 
doi:10.1145/3029806.3029807 dblp:conf/codaspy/DmitrienkoP17 fatcat:iiadgjz6e5gotm4y7r7s43oxki

Searchitect - A Developer Framework for Hybrid Searchable Encryption (Position Paper)

Ulrich Haböck, Manuel Koschuch, Ines Kramer, Silvie Schmidt, Mathias Tausig
2018 Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security  
Searchable encryption (SE) allows to outsource data to the cloud in a secure way, whilst permitting search functionality on that encrypted data: the host is able to perform search queries on behalf of  ...  It aims at developers keeping track of recent SE developments, providing an easy deployable solution for testing in public and private clouds.  ...  The client uses its key material to extract the plaintext list of matching document ids from the encrypted search reply, handing it over to the application.  ... 
doi:10.5220/0006789402910298 dblp:conf/iotbd/HabockKKST18 fatcat:fxijy5qjebdh7i72f6lwng7mcu

Survey on Remote Electronic Voting [article]

Alexander Schneider and Christian Meter and Philipp Hagemeister
2017 arXiv   pre-print
In this survey we try to give a brief and precise overview and summary of the current situation.  ...  Electronic and remote voting has become a large field of research and brought forth a multiplicity of schemes, systems, cryptographic primitives as well as formal definitions and requirements for electronic  ...  After the voter makes her voting decisions, her choices are encrypted with the public keys from the TC and the SC and send through the proxy servers to TC and SC.  ... 
arXiv:1702.02798v1 fatcat:3cgqjsovonelne4s3nrko6bui4

Peace vs. Privacy

Mohammad Mannan, Arash Shahkar, Atieh Saberi Pirouz, Vladimir Rabotka
2015 Proceedings of the New Security Paradigms Workshop on ZZZ - NSPW '15  
CherAmi is a client-end solution and does not require changes to email or OSN servers.  ...  In this paper, the focus of our discussion includes: the paradigm of security through hostility, and the design, implementation and security analysis of the proposed encrypted email solution.  ...  NSPW 2015, and members of Concordia's Madiba Security Research Group; we thank them all.  ... 
doi:10.1145/2841113.2841123 dblp:conf/nspw/MannanSPR15 fatcat:tkwlv5z4ajf5bj4olnsu4exngq

Architecture For Data Management

Marko Vukolic
2015 Zenodo  
We survey security and dependability technologies and discuss designs for the overall unifying architecture for data management that serves as an umbrella for different security and dependability data  ...  Specifically the document lays out the architecture for data privacy, secure sharing schemes, geo-replication and fault and disaster tolerance for SUPERCLOUD data management.  ...  patterns may reveal up to 80% of search queries on an encrypted e-mail database [101] .  ... 
doi:10.5281/zenodo.49788 fatcat:5oup2d7sk5dm7efj77pjvg2bru

Survey on Identity based and Hierarchical Identity based Encryption Schemes

D. Kalyani, R. Sridevi
2016 International Journal of Computer Applications  
We also discuss Revocable Identity Based Encryption (RIBE) schemes from the view point of security models and constructions.  ...  In this paper, we present a comprehensive picture and the state of the art of Identity Based Cryptography (IBC) and their security implications with applications.  ...  A collection of cryptographic primitives used to provide security services is called cryptosystem.  ... 
doi:10.5120/ijca2016908158 fatcat:spjqzcascfe33djkrhcg3ej4mu

DisCo: middleware for securely deploying decomposable services in partly trusted environments

E. Freudenthal, Vijay Karamcheti
2004 24th International Conference on Distributed Computing Systems, 2004. Proceedings.  
DisCo is an umbrella infrastructure, comprised of a set of independent but highly interoperable core components and abstractions, intended to provide programmers with a more complete solution to the problem  ...  Consumers of these services must be able to discover, securely acquire the code for, and install service components over the network with only minimal a priori knowledge of their locations.  ...  The code for the secure mail service had a larger deployment component.  ... 
doi:10.1109/icdcs.2004.1281616 dblp:conf/icdcs/FreudenthalK04 fatcat:l6iu36nwtzhcfpl3bn4bgwlvha

CloudKeyBank: Privacy and owner authorization enforced key management framework

Xiuxia Tian, Ling Huang, Tony Wu, Xiaoling Wang, Aoying Zhou
2016 2016 IEEE 32nd International Conference on Data Engineering (ICDE)  
To implement CloudKeyBank efficiently, we propose a new cryptographic primitive named Searchable Conditional Proxy Re-Encryption (SC-PRE) which combines the techniques of Hidden Vector Encryption (HVE)  ...  and Proxy Re-Encryption (PRE) seamlessly, and propose a concrete SC-PRE scheme based on existing HVE and PRE schemes.  ...  how to combine HVE and PRE seamlessly from the cryptography theory and security.  ... 
doi:10.1109/icde.2016.7498383 dblp:conf/icde/TianHWWZ16 fatcat:rzzwlkzvtfbi5awbxrpnscdww4

CloudKeyBank: Privacy and Owner Authorization Enforced Key Management Framework

Xiuxia Tian, Ling Huang, Tony Wu, Xiaoling Wang, Aoying Zhou
2015 IEEE Transactions on Knowledge and Data Engineering  
To implement CloudKeyBank efficiently, we propose a new cryptographic primitive named Searchable Conditional Proxy Re-Encryption (SC-PRE) which combines the techniques of Hidden Vector Encryption (HVE)  ...  and Proxy Re-Encryption (PRE) seamlessly, and propose a concrete SC-PRE scheme based on existing HVE and PRE schemes.  ...  how to combine HVE and PRE seamlessly from the cryptography theory and security.  ... 
doi:10.1109/tkde.2015.2457903 fatcat:qe2qu2xlhrhdrosnpmvldmapnq

The middlebox manifesto

Vyas Sekar, Sylvia Ratnasamy, Michael K. Reiter, Norbert Egi, Guangyu Shi
2011 Proceedings of the 10th ACM Workshop on Hot Topics in Networks - HotNets '11  
Most network deployments respond to changing application, workload, and policy requirements via the deployment of specialized network appliances or "middleboxes".  ...  To this end, our vision is a world with software-centric middlebox implementations running on general-purpose hardware platforms that are managed via open and extensible management APIs.  ...  To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. hardware such as x86 CPUs [20, 22, 10] , GPUs [15] , FP-GAs [13] and  ... 
doi:10.1145/2070562.2070583 dblp:conf/hotnets/SekarRRES11 fatcat:ubg7xaxa3bguzakghr2k6aateu

Attestation Transparency

Jethro G. Beekman, John L. Manferdelli, David Wagner
2016 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16  
Combined, this creates a platform that allows legacy clients to obtain security guarantees about Internet services.  ...  Internet services can provide a wealth of functionality, yet their usage raises privacy, security and integrity concerns for users.  ...  This work was supported by Intel through the ISTC for Secure Computing, AFOSR under MURI award FA9550-12-1-0040, and NSF under CCF-0424422.  ... 
doi:10.1145/2897845.2897895 dblp:conf/ccs/BeekmanMW16 fatcat:tfcnuuch2ramplztvrn2tglkyu
« Previous Showing results 1 — 15 out of 655 results