Filters








3,032 Hits in 4.6 sec

Distributed Timestamp Mechanism Based on Verifiable Delay Functions

Qiang Wu, Zhaoyang Han, Ghulam Mohiuddin, Yongjun Ren
2023 Computer systems science and engineering  
Therefore, this paper designs a distributed timestamp mechanism based on continuous verifiable delay functions.  ...  Moreover, a digital blind signature based on elliptic curve cryptography is utilized to solve the problem of timestamp forgery in timestamp service.  ...  So, non-interactive proofs are generated via verifiable delay functions (VDF) random oracles.  ... 
doi:10.32604/csse.2023.030646 fatcat:hgl47wktgzhw5oyaffilxzcm2e

SecX: A Framework for Collecting Runtime Statistics for SoCs with Multiple Accelerators

Rajshekar Kalayappan, Smruti R. Sarangi
2015 2015 IEEE Computer Society Annual Symposium on VLSI  
This problem is non-trivial if we consider the possibility of defective or malicious elements in the chip.  ...  In this setting, it is beneficial to collect accurate runtime information such that we can diagnose performance problems, verify and report correctness issues, and collect usage scenarios of third party  ...  A hash-based message authentication code (HMAC) (based on 256-bit SHA) of the log is made to ensure integrity and authenticity. The AC has its own limited non-volatile storage to store the logs.  ... 
doi:10.1109/isvlsi.2015.22 dblp:conf/isvlsi/KalayappanS15 fatcat:suambpmxfravtfsmn5agmpikma

Time Transitive Functions for Zero Knowledge Proofs [article]

Ekleen Kaur, Gokul Alex
2021 arXiv   pre-print
Verifiable delay functions have found a lot of applications in blockchain technology in recent times.  ...  Continuous verifiable delay functions are an improvement over the basic notion of VDFs with recursive capabilities.  ...  Landerreche [19] unlike our correlation proposes a basic idea of culminating non-interactive cryptographic timestamping and some applications in decentralization, the paper revises on the impossibility  ... 
arXiv:2108.06389v1 fatcat:dc4hp5hvnbeyloziw3losi6ddu

Towards Practical Attribute-Based Signatures [chapter]

Brinda Hampiholi, Gergely Alpár, Fabian van den Broek, Bart Jacobs
2015 Lecture Notes in Computer Science  
In this paper, we propose an ABS scheme based on the existing IRMA technology, extending the currently available IRMA devices with ABS functionality.  ...  This is why we put forward a new ABS technique based on the IRMA attribute-based authentication.  ...  An attribute-based signature within IRMA is essentially a non-interactive proof of knowledge of authentic attributes (see Section 3).  ... 
doi:10.1007/978-3-319-24126-5_18 fatcat:jpbsayesljalth3r6ihtmd4wxy

Token Model and Interpretation Function for Blockchain-Based FinTech Applications

Kanta MATSUURA
2019 IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences  
With a focus on financial instruments using blockchain, research directions toward stable applications are identified with the help of a newly proposed stabilizer: interpretation function of token valuation  ...  complicated way of accommodating multiple input factors to a hash function.  ...  Verification of the timestamp. If needed, the document submitters verify their timestamps on receiving the necessary materials from TSS. 1.  ... 
doi:10.1587/transfun.e102.a.3 fatcat:bu3mswom5rbajmemp7yddq4m6y

A Multifactor Multilevel and Interaction Based (M2I) Authentication Framework for Internet of Things (IoT) Applications

Salem Aljanah, Ning Zhang, Siok Wah Tay
2022 IEEE Access  
The framework implements LoA linked and interaction based authentication.  ...  Two interaction modes, P2P (Peer-to-Peer) and O2M (One-to-Many), are investigated via the design of two corresponding protocols.  ...  An example of a non-cryptographic operation used in our protocols is the timestamp verification using the TS-Veri algorithm.  ... 
doi:10.1109/access.2022.3170844 fatcat:znfxczy47feuzm7tidiekt2gy4

EnclavePoSt: A Practical Proof of Storage-Time in Cloud via Intel SGX

Yang Zhang, Weijing You, Shijie Jia, Limin Liu, Ziyi Li, Wenfei Qian, Wenxiu Ding
2022 Security and Communication Networks  
Data integrity is one of the most critical security concerns for users when using the cloud storage service.  ...  The checking results can be aggregated and efficiently verified by users.  ...  For schemes relying on cryptographic primitives, Boneh et al. [42] firstly formalized Verifiable Delay Functions (VDF).  ... 
doi:10.1155/2022/7868502 fatcat:6blrl3xsrnf7tg6sqts4p33icq

Cryptanalysis of a flexible remote user authentication scheme using smart cards

Wei-Chi Ku, Shuai-Min Chen
2005 ACM SIGOPS Operating Systems Review  
In 2002, Lee, Hwang, and Yang proposed a verifier-free remote user authentication scheme using smart cards. Their scheme is efficient because of mainly using cryptographic hash functions.  ...  To avoid using high-complexity operations such as modular exponentiation, Sun [19] proposed an efficient verifier-free password authentication scheme using smart cards based on cryptographic hash functions  ...  In 1990, Hwang, Chen, and Laih [8] proposed a non-interactive password authentication scheme and its enhanced version, which additionally uses smart cards.  ... 
doi:10.1145/1044552.1044562 fatcat:5w272e3jjbcmzam6yxb7enfyoe

A Multi-factor Multi-level and Interaction based (M2I) Authentication Framework for Internet of Things (IoT) Applications [article]

Salem AlJanah, Ning Zhang, Siok Wah Tay
2022 arXiv   pre-print
The framework implements LoA linked and interaction based authentication.  ...  Two interaction modes are investigated, P2P (Peer-to-Peer) and O2M (One-to-Many) via the design of two corresponding protocols.  ...  An example of a non-cryptographic operation used in our protocols is the timestamp verification using the TS-Veri algorithm.  ... 
arXiv:2201.07323v2 fatcat:xfzow7zplvc2jjko4tchlv34t4

KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures [article]

Michael Specter, Sunoo Park, Matthew Green
2019 arXiv   pre-print
We formally define non-attributability, and present two practical system proposals -- KeyForge and TimeForge -- that provably achieve non-attributability while maintaining the important protection against  ...  In this paper, we introduce "non-attributable email", which guarantees that a wide class of adversaries are unable to convince any third party of the authenticity of stolen emails.  ...  Schemes based on other interactive protocols such as OTR [12] are inappropriate for similar reasons.  ... 
arXiv:1904.06425v1 fatcat:fznsf63htnc6xb3poyrlj734zi

Secure Client Puzzles Based on Random Beacons [chapter]

Yves Igor Jerschow, Martin Mauve
2012 Lecture Notes in Computer Science  
Most existing client puzzle schemes are interactive. Upon receiving a request the server constructs a puzzle and asks the client to solve this challenge before processing its request.  ...  A special beacon server broadcasts beacon messages which can be easily verified by matching their hash values against a list of beacon fingerprints that has been obtained in advance.  ...  In [9] we have introduced a novel non-interactive client puzzle scheme that is based on the computation of square roots modulo a prime.  ... 
doi:10.1007/978-3-642-30054-7_15 fatcat:uh3ypnbx5ncy3e4qmnwhz3e4x4

A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access

Xin Jiang, Mingzhe Liu, Chen Yang, Yanhua Liu, Ruili Wang
2019 Computers Materials & Continua  
Smart devices based on ARM processor bring us more convenience, they also become an attractive target of cyberattacks.  ...  However, some additional configurations of trusted third party agencies are still needed on-site to deploy a secure authentication system.  ...  A hybrid cryptographic scheme based on block chain was proposed in Monroe by Yuan et al. [Yuan, Xu and Si (2017) ], which is independent of central nodes. Sasson et al.  ... 
doi:10.32604/cmc.2019.03863 fatcat:4i66u47j2zgengnz4e56bcm5oa

Secure Combination of IoT and Blockchain by Physically Binding IoT Devices to Smart Non-Fungible Tokens Using PUFs

Javier Arcenegui, Rosario Arjona, Roberto Román, Iluminada Baturone
2021 Sensors  
Non-fungible tokens (NFTs) are widely used in blockchain to represent unique and non-interchangeable assets.  ...  A whole demonstration of the proposal developed with ESP32-based IoT devices and Ethereum blockchain is presented, using the SRAM of the ESP32 microcontroller as the PUF.  ...  The interaction with the blockchain or smart contract The Smart NFT-Based Smart Contract The smart NFT-based smart contract was developed in Solidity language on Remix IDE [18] .  ... 
doi:10.3390/s21093119 pmid:33946227 fatcat:bt3vg5ln5jg3dgu44nrwpfeebu

IoT Expunge

Nisha Panwar, Shantanu Sharma, Peeyush Gupta, Dhrubajyoti Ghosh, Sharad Mehrotra, Nalini Venkatasubramanian
2020 Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy  
Experimental results on a real-world smart building testbed show that IoT Expunge imposes minimal overheads to the user to verify the data against data retention policies.  ...  One such law relates to strict enforcement of data retention policies.  ...  Step 2: Cryptographic timestamp generation. Based on the cryptographic timestamp, we create a chain of timestamps using the one-way accumulator.  ... 
doi:10.1145/3374664.3375737 dblp:conf/codaspy/Panwar0GGMV20 fatcat:x7sjcg5khzh3tflt4bufpjnome

A Proactive DOS Filter Mechanism for Delay Tolerant Networks [chapter]

Godwin Ansa, Haitham Cruickshank, Zhili Sun
2011 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
The effect of DOS in a delay tolerant network (DTN) is even more aggravated due to the scarcity of resources.  ...  Based on the NTL indicator, the BPA is able to choose which ciphersuite to use to verify the DTN-cookie.  ...  H is a cryptographic hash function such as MD5, SHA1 or SHA256.  ... 
doi:10.1007/978-3-642-23825-3_20 fatcat:dr4htt5uanb4rlwk4h56xigiiy
« Previous Showing results 1 — 15 out of 3,032 results