183 Hits in 4.1 sec

On the Connection Between Signcryption and One-Pass Key Establishment [chapter]

M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
Cryptography and Coding  
There is an intuitive connection between signcryption and one-pass key establishment. Although this has been observed previously, up to now there has been no formal analysis of this relationship.  ...  The main purpose of this paper is to prove that, with appropriate security notions, one-pass key establishment can be used as a signcryption KEM and vice versa.  ...  Acknowledgements The authors thank Alex Dent for his extensive comments and expert advice. This work was supported by the Australian Research Council under grant DP0773348.  ... 
doi:10.1007/978-3-540-77272-9_17 dblp:conf/ima/GorantlaBN07 fatcat:gjsngyxklvbr5acfcvf7t2lfea

An Enhancing Security Research of Tor Anonymous Communication to Against DDos Attacks

Tao Feng, Ming-Tao Zhao, L. Long, Y. Li, X. Li, Y. Dai, H. Yang
2017 ITM Web of Conferences  
and so on.  ...  An identity and Signcryption-based concurrent signature scheme was used to prevent the behaviors of attackers from inserting controlled nodes and conspiring to make DDos attacks.  ...  Acknowledgement This work is supported by the National Nature Science Foundation of China (No.61462060).  ... 
doi:10.1051/itmconf/20171204018 fatcat:6ffhww4elfde5hzxcoddffzgjq

Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives

S. Sree Vivek, Sharmila Deva Selvi, Pallavi Chandrasekar, C. Pandu Rangan
2016 Journal of Internet Services and Information Security  
In this paper, we explore the connection between commitment schemes, public key encryption, digital signatures and signcryption.  ...  We establish formal relationship between commitment and the other primitives. Our main result is that we show signcryption can be used as a commitment scheme with appropriate security notions.  ...  Choudary Gorantla et al. established the connection between Signcryption and One-pass Key Establishment in [16] .  ... 
doaj:13eb9076ff9042d49530635ba9539033 fatcat:hrkbdgnjbzfplicrdvpufrnjli

Group Key Agreement From Signcryption

Xixiang Lv
2012 KSII Transactions on Internet and Information Systems  
There is an intuitive connection between signcryption and key agreement. Such a connector may lead to a novel way to construct authenticated and efficient group key agreement protocols.  ...  Following the generic construction, we instantiate a distributed two-round group key agreement protocol based on signcryption scheme given by Dent [8] .  ...  [7] define security notions and show how signcryption and one-pass key establishment can be related under those notions.  ... 
doi:10.3837/tiis.2012.12.017 fatcat:evopfszwfzantjxix6hpgl7xwm

A Novel Security Protocol for Wireless Sensor Networks Based on Elliptic Curve Signcryption

Anuj Kumar Singh, B.D.K. Patro
2019 International Journal of Computer Networks & Communications  
, secure key establishment, and key privacy at the same time providing resistance from replay attack, impersonation attack, insider attack, offline dictionary attack, and stolen-verifier attack.  ...  With the growing usage of wireless sensors in a variety of applications including Internet of Things, the security aspects of wireless sensor networks have been on priority for the researchers.  ...  The sensor nodes and gateway are connected through wireless links, and the data among them is passed using radio signals.  ... 
doi:10.5121/ijcnc.2019.11506 fatcat:6auu6sbv7vcutjnhx33epyifhq

Efficient Authentication for Internet of Things Devices in Information Management Systems

Xiaofeng Wu, Fangyuan Ren, Yiming Li, Zhenwei Chen, Xiaoling Tao, Ximeng Liu
2021 Wireless Communications and Mobile Computing  
In the proposed scheme, aggregated certificateless signcryption is used to complete mutual authentication and encrypted transmission of data, and a cloud server is introduced to ensure service continuity  ...  This scheme is suitable for scenarios where large-scale IoT terminal devices are simultaneously connected to the information management system.  ...  Based on the aggregated signcryption information, AMF can verify IoT members in each group. A key will be established between each terminal device and the AMF to ensure the security of the data.  ... 
doi:10.1155/2021/9921036 fatcat:o6u7kmzxf5b77jlwk6fqq2eoey

A Secure NDN Framework for Internet of Things Enabled Healthcare

Syed Sajid Ullah, Saddam Hussain, Abdu Gumaei, Hussain AlSalman
2021 Computers Materials & Continua  
Besides, we deployed the proposed scheme on the IoTEH in NDN infrastructure and compared it with the recent IBS schemes in terms of computation and communication overheads.  ...  In the proposed work, we adopt the services of Identity-Based Signcryption (IBS) cryptography under the security hardness Hyperelliptic Curve Cryptosystem (HCC) to secure the IoTEH information in NDN.  ...  Funding Statement: The authors received no financial support for the research, authorship, and/or publication of this article.  ... 
doi:10.32604/cmc.2021.014413 fatcat:gbdbyifcera5nchonwrppplpb4

A Relay-assisted Secure Handover Mechanism for High-speed Trains

2019 KSII Transactions on Internet and Information Systems  
It can achieve mutual authentication for train-ground wireless communication, and data transmission is consistent with one-time pad at the same time.  ...  The security analysis, efficiency analysis and simulation results show that the proposed mechanism not only realizes the forward security and resists many common attacks, but also effectively reduces the  ...  In the SHPA mechanism, the RS and eNodeB 2 establish a connection through eNodeB 1. The messages exchanged between the RS and eNodeB are encrypted by the session key.  ... 
doi:10.3837/tiis.2019.02.006 fatcat:szh2ayqm4fdbfmdc7ujibw7j3u

An Authentication Protocol in LTE-WLAN Heterogeneous Converged Network based on Certificateless Signcryption Scheme with Identity Privacy Protection

Liling Cao, Yuqing liu, Shouqi Cao
2019 IEEE Access  
master session key(MSK), resistance to impersonation attack, replay attack, man-in-the-middle attack, redirect attack and Denial of Service (DoS) attack, mutual authentication between communication entities  ...  The security analysis shows that by using certificateless signcryption(CLSC) scheme without pairing calculation based on Elliptic Curve Cryptography (ECC), hash chain and identity index mechanism, the  ...  For instance, it has been assumed that a secure connection and shared keys have been established between AAA and WLAN AN, and between AAA and HSS.  ... 
doi:10.1109/access.2019.2941913 fatcat:46cheuctfzaovok3l4eezsrer4

An Upgraded SignCryption Scheme Using FORWARD SECRECY

2015 International Journal of Research and Applications  
SignCryption is a different prototype in public key cryptography technique to provide confidentiality and authentication in a single logical stride at the lowest computation cost and communication overhead  ...  The proposed signcryption schemes are compact and particularly suitable for smart card based applications. We envisage that they will end  ...  Among these applications, one can first think of the following three: • Secure and authenticated key establishment, • Secure multicasting and • Authenticated key recovery.  ... 
doi:10.17812/ijra.2.7(56)2015 fatcat:yrw5b573onbz5bjmyfmvawxvj4

Practical Identity based online/off-line signcryption scheme for secure communication in Internet of Things

Vankamamidi S. Naresh, Sivaranjani Reddi, Saru Kumari, V V L Divakar Allavarpu, Sachin Kumar, Ming-Hour Yang
2021 IEEE Access  
This paper is proposing a new Identity based online/off-line signcryption scheme suitable to provide secure message communication among IoT devices, gateway, and the server.  ...  signcryption phase.  ...  All these nodes are connected to base station, which is act as the gateway between the sensor nodes and the user since it is forwarding the data from WSNs and the Internet Server.  ... 
doi:10.1109/access.2021.3055148 fatcat:uq7dvzeuorh2vhft5x2kiayr4i

On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification [chapter]

Afonso Arriaga, Manuel Barbosa, Pooya Farshim
2012 Lecture Notes in Computer Science  
We introduce stronger notions of security for encryption and signatures, where challenge messages can depend in a restricted way on the random coins used in encryption, and show that two variants of the  ...  We extend the work of Bellare, Boldyreva and Staddon on the systematic analysis of randomness reuse to construct multi-recipient encryption schemes to the case where randomness is reused across different  ...  The authors would like to thank Nigel Smart and the anonymous ACNS'12 reviewers for helping to improve the quality of the paper.  ... 
doi:10.1007/978-3-642-31284-7_13 fatcat:6w5ppsu2rrhrlakjrpv3m33tiq

One-Pass HMQV and Asymmetric Key-Wrapping [chapter]

Shai Halevi, Hugo Krawczyk
2011 Lecture Notes in Computer Science  
Such one-way communication can be viewed as one-pass key-exchange protocols with implicit client authentication (and in some cases also server authentication).  ...  The performance difference between the unauthenticated DHIES and the authenticated HOMQV is very minimal (essentially for free for the server and only 1/2 exponentiation for the client).  ...  We note that the precise connection between key-exchange and signcryption was established in the work of Gorantla et al.  ... 
doi:10.1007/978-3-642-19379-8_20 fatcat:ysd6chk44fhajolaof6x3alrwe

Data Security in Unattended Wireless Sensor Networks through Aggregate Signcryption

2012 KSII Transactions on Internet and Information Systems  
In this paper, we propose aggregate signcryption for achieving data security in UWSNs. The main challenge of these networks established in sensitive environments is offline sink visiting.  ...  In addition, the aggregation process of our scheme reduces the space and communication overheads both for sensors and sink, i.e. the proposed technique efficiently enables the sensors and sink to protect  ...  Consequently, all of the signcryptions in one interval are connected like a chain. This trick prevents the adversary from erasing some random or target signcryptions from many sensors.  ... 
doi:10.3837/tiis.2012.11.011 fatcat:mkfmczukmbckppygpyi74wrx7y

Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of Things

Kim Thuat Nguyen, Nouha Oualha, Maryline Laurent
2015 2015 IEEE Trustcom/BigDataSE/ISPA  
For illustration, we conducted experimental evaluation based on a sensor Wismote platform and compared the performance of the proposed scheme to concurrent schemes.  ...  Third, the scheme offers the certificateless feature, so certificates are not needed to verify the user's public keys.  ...  Asymmetric approaches for secure communication establishment is a good alternative since they are able to establish a secure communication between two entities who do not share any common keys.  ... 
doi:10.1109/trustcom.2015.408 dblp:conf/trustcom/NguyenOL15 fatcat:nig44ilydzex5oqdrpvnctswue
« Previous Showing results 1 — 15 out of 183 results