Filters








34,424 Hits in 3.2 sec

On Composable Security for Digital Signatures [chapter]

Christian Badertscher, Ueli Maurer, Björn Tackmann
2018 Lecture Notes in Computer Science  
Canetti (FOCS 2001, CSFW 2004 as well as Backes, Pfitzmann, and Waidner (CCS 2003) have described ideal functionalities for signatures in their respective composable-security frameworks.  ...  In this paper, we describe digital signature schemes from a different, more abstract perspective.  ...  A Constructive Perspective on Digital Signatures The Basic Definitions Our security definition for DSSs is based on the repositories introduced in Sect. 3.  ... 
doi:10.1007/978-3-319-76578-5_17 fatcat:t7uvynwzvfg27f6vk6dtf3wexa

Model-based Design of Reusable Secure Connectors

Michael Eonsuk Shin, Hassan Gomaa, Don Pathirage
2017 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems  
Integration of security patterns and communication patterns within a secure connector is enabled by a security coordinator.  ...  The main advantage is that secure connectors can be reused in different secure applications.  ...  The Digital Signature Signer SPC depicted in Fig. 8 is a composite component that is composed of the Signer and Signature Algorithm security components.  ... 
dblp:conf/models/ShinGP17 fatcat:facq6bxmdfbzll767cm5br4wea

An Architectural Framework for Analyzing Tradeoffs between Software Security and Performance [chapter]

Vittorio Cortellessa, Catia Trubiani, Leonardo Mostarda, Naranker Dulay
2010 Lecture Notes in Computer Science  
Composability of models allows to introduce different security solutions on the same software architecture, thus supporting software architects to find appropriate security solutions while meeting performance  ...  We introduce a library of UML models representing security mechanisms that can be composed with performance annotated UML application models for architecting security and performance critical systems.  ...  It depends on the digital signature generation, as reported in Table 1 .  ... 
doi:10.1007/978-3-642-13556-9_1 fatcat:wzdm4kivqzabtjnmdddwi26r3e

An optimistic fair exchange protocol and its security in the universal composability framework

Yusuke Okada, Yoshifumi Manabe, Tatsuaki Okamoto
2008 International Journal of Applied Cryptography  
In this paper, we define the ideal functionality of the fair exchange protocol in the universal composability framework, and present an optimistic fair exchange protocol that is secure in this framework  ...  Here, we consider the case that parties A and B exchange a digital signature on M A for digital data M B .  ...  For example, Alice purchases digital data (e.g., music files, license keys) from Bob in exchange for her digital signature on the purchase contract.  ... 
doi:10.1504/ijact.2008.017052 fatcat:rgn3nkoqx5hzbn5yfuqto233ha

A DRM System Based on PKI

Lili Zhang, ZhiYong Zhang, Dan Mei Niu, Sen Shen, Chuan Qi Ye
2010 2010 Fourth International Conference on Genetic and Evolutionary Computing  
A DRM system scheme based on PKI is proposed and designed in this paper, which can achieve secure distribution and use of digital content.  ...  The system architecture, secure mechanism, workflow are described.  ...  It uses the basic theory of public key cryptography for network applications such as authentication, authorization, encryption, decryption, digital signatures and other security services and is a new information  ... 
doi:10.1109/icgec.2010.136 fatcat:h7mrp6jravd4hi7ekytwptgvii

A Software Product Line Approach for Feature Modeling and Design of Secure Connectors

Michael Shin, Hassan Gomaa, Don Pathirage
2018 Proceedings of the 13th International Conference on Software Technologies  
features used in the design of secure component-based software architectures for concurrent and distributed software applications.  ...  Integration of these components within a secure connector is enabled by a security coordinator.  ...  ) .  Digital Signature feature protects against one party to a transaction later falsely denying that the transaction occurred.  ... 
doi:10.5220/0006904805400551 dblp:conf/icsoft/ShinGP18 fatcat:jgb63lucfrh3tixoenh5pnnati

Secure Digital Signature Schemes based on Hash Functions

PRACHI PRAVINKUMAR PATEL
2015 INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING AND SCIENCES  
This paper presents a digital signature scheme and discusses the security aspects of proposed digital signature scheme.  ...  This paper provides a literature review and analysis of the security systems and the emphasis is on digital signature, hashed message algorithm.  ...  Fig. 1 1 Process of digital signature for authentication Fig. 2 2 Verification of Digital Signature on the Receiver Side Fig. 3 3 One Operation of MD5 Algorithm denote the XOR,AND,OR and NOT operations  ... 
doi:10.26472/ijces.v1i1.18 fatcat:b43a2ftyybcsrciyh7nckeh6dm

Automatic Composition of Services with Security Policies

Yannick Chevalier, Mohammed Anis Mekki, Michaël Rusinowitch
2008 2008 IEEE Congress on Services - Part I  
For the domain of security services (such as digital signing or timestamping) we propose a novel approach to automated composition of services based on their security policies.  ...  The resulting composed service can be verified automatically for ensuring that it cannot be subject to active attacks from intruders.  ...  This trace can be directly translated to a composed service for Digital Contract Signing. In fact this automatically synthetized service is exactly the same as the one provided by OpenTrust.  ... 
doi:10.1109/services-1.2008.13 dblp:conf/services/ChevalierMR08 fatcat:v2w6on7grvb33gwxqwzacikqfq

Ring signatures

Kazuki Yoneyama, Kazuo Ohta
2007 Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07  
First, we will formulate new ideal functionalities of ring signature schemes for each security levels separately.  ...  In this paper, we will redefine anonymity and unforgeability definitions from the standpoint of universally composable (UC) security framework.  ...  F (uf ,anon) rSIG receives three instructions for basic function of ring signature schemes(Key Generation, Signature Generation and Signature Verification requests) and one instruction for the adversary  ... 
doi:10.1145/1229285.1229332 dblp:conf/ccs/YoneyamaO07 fatcat:g4u5pm57u5cqtkouzy7dize5oe

Digital Signature for data and documents using operating PKI certificates

Adil El Mane, Younes Chihab, Redouan Korchiyne, A. Moumen, N. Mejjad, H. Slimani
2021 SHS Web of Conferences  
This report represents my researching work for a six-month internship in Lex Persona Enterprise.  ...  The research has the goal of signing PDF documents digitally using the hash-and-sign method.  ...  In the security field, the Digital Signature acts as the organization for all public-key cryptography. It starts by running the key-generation algorithm.  ... 
doi:10.1051/shsconf/202111907004 fatcat:bwxnuiyhkvfbbgq4fojcgwhkjy

Exploration of Core Technologies of Cyber Security

Xianghao Nan
2021 OALib  
technical route for cyber security was formed, and the practical significance of identification was discussed.  ...  The proof logic of PKI certification system and the digital signature standard DSA were analyzed, subsequently the signature elements are clarified and found that CPK public key could satisfy all the elements  ...  In other words, a digital signature must contain proof of claim, otherwise it cannot be called a digital signature.  ... 
doi:10.4236/oalib.1107795 fatcat:itznrlqshbfwbmwmc3vkryc4he

Implementation of Schnorr Signcryption Algorithm on DSP

Aya Elshobaky, Mohamed Rasslan, Shawkat Guirguis
2015 International Journal of Security and Its Applications  
Cryptography is considered as one of the key elements that provides security for mobile systems.  ...  The lack of data security in public mobile telecommunication system increases the need for a strong data protection and security mechanisms.  ...  Using the current standard signature-then-encryption, the cost of delivering a message in an authenticated and secure way, will consume the sum of the cost for the digital signature and that for the encryption  ... 
doi:10.14257/ijsia.2015.9.11.21 fatcat:ulfw5wob35gcjbreckrvcreaiu

Using Security Patterns for Modelling Security Capabilities in Grid Systems

Benjamin Aziz, Clive Blackwell
2014 2014 IEEE 8th International Symposium on Service Oriented System Engineering  
We extend previous work on formalising design patterns to start the development of security patterns for Grid systems.  ...  We also specifically describe the use of authentication patterns that model the extension of trust from a secure core, and indicate how these patterns can be composed, specialised and instantiated.  ...  We first indicate the required properties of the primitive security patterns that constitute the digital signature pattern.  ... 
doi:10.1109/sose.2014.60 dblp:conf/sose/AzizB14 fatcat:rqn76a75orczrexyj3oo5lwtm4

Secure Privacy Implications for Clients and End-users through Key Assortment Crypto Techniques Implicated Algorithm

Ramesh D, Rama B
2018 International Journal of Electrical and Computer Engineering (IJECE)  
techniques and various levels of cryptographic algorithms with their implications along with extensions of cloud implicated data security and digital forensics implicated appliances which is implicated  ...  The main role of key assortment crypto techniques will helpful to provide the security to the sensitive data and play the key role for business developments.  ...  Client and End-User Environmental Signatures The first level of execution composes the initial authenticated sequences about the end-user implicated signatures through plain text (PPT) of signature mode1  ... 
doi:10.11591/ijece.v8i6.pp5443-5448 fatcat:3lnxrw4jkzgornw2zh4bp65hj4

Security of Analysis Liu's Signature Scheme

Shaoka Zhao, Chenglian Liu
2012 Energy Procedia  
It is therefore insecure for his improvement. In this paper, we pointed out who do a forge attack successfully.  ...  In 2007, Liu proposed an improvement of Shieh et al. multi-signature scheme in mobile code system. There exist forgery attacks of multiplicative algebra method in his scheme.  ...  Acknowledgements The authors would like to thank anonymous reviewers for their valuable comments.  ... 
doi:10.1016/j.egypro.2012.02.150 fatcat:4yv2oc6rczc2fhefpcuz2wflne
« Previous Showing results 1 — 15 out of 34,424 results