Filters








2,385 Hits in 7.4 sec

Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability [chapter]

Alexander W. Dent, Qiang Tang
Lecture Notes in Computer Science  
The concept of timed-released encryption with pre-open capability (TRE-PC) was introduced by Hwang, Yum and Lee.  ...  In a TRE-PC scheme, a message is encrypted in such a way that it can only be decrypted at a certain point in time or if the sender releases a piece of trapdoor information known as a pre-open key.  ...  The information in this document reflects only the authors' views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose.  ... 
doi:10.1007/978-3-540-75496-1_11 fatcat:uoj6gvegsjhejbj6baui7erlry

Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions [article]

Runhua Xu, James Joshi
2020 arXiv   pre-print
This paper revisits the secure computation problem using emerging and promising functional encryption techniques and presents a comprehensive study.  ...  Most of the existing secure computation solutions rely on garbled-circuits and homomorphic encryption techniques to tackle secure computation issues, including efficiency and security guarantees.  ...  Acknowledgment This work was performed while James Joshi was serving as a Program Director at NSF; and the work represents the authors' views and not that of NSF's.  ... 
arXiv:2011.06191v2 fatcat:t4iamavzovcrzblxtbkqedk4yi

Data Sharing in Cloud Computing Based On Attribute Based Encryption System

K. Subha, P. Kushal Reddy
2017 International Journal of MC Square Scientific Research  
This brings a potential security risk to the user, since CSP may compromise the data for commercial benefits.  ...  Ciphertext-policy attribute-based encryption (CP-ABE) has turned to be an important encryption technology to tackle the challenge of secure data sharing.  ...  For the security purpose the data owner encrypts the data file and then store in the cloud. The Data owner can have capable of manipulating the encrypted data file.  ... 
doi:10.20894/ijmsr.117.009.002.007 fatcat:wlueoslglrgm7njjgbhiij6eba

RansomClave: Ransomware Key Management using SGX [article]

Alpesh Bhudia, Daniel O'Keeffe, Daniele Sgandurra, Darren Hurley-Smith
2021 arXiv   pre-print
We use RansomClave to explore the implications of enclave-enhanced ransomware for the key generation, encryption and key release phases of the ransomware lifecycle, and to identify potential limitations  ...  We find that some existing mitigations are likely to be effective during the key generation and encryption phases, but that RansomClave enables new trustless key release schemes that could potentially  ...  ACKNOWLEDGMENTS This research of Alpesh Bhudia is supported by the EPSRC and the UK government as part of the Centre for Doctoral Training in Cyber Security at Royal Holloway, University of London (EP/  ... 
arXiv:2107.09470v1 fatcat:muq3z6rfuve4zl6to3sc627rjy

D1.1: COLLABS Innovations for Industrial IoT Systems1

Miloš Radovanović, Wafa Ben Jaballah, George Bravos, Erwan Le-Disez, Ernesto Gomez Marin, Erwin Moed, Md Masoom Rabbani, Valerio Senni, Fabio Federici, George Spanoudakis, Konstantinos Fysarakis, Martin Wimmer (+2 others)
2021 Zenodo  
attestation for tackling security issues in IoT systems, implementations of secure multiparty computation (SMC) and homomorphic encryption (HE), platforms providing trusted execution environments (TEEs  ...  Section 9 concludes the deliverable with a summary of the impacts of the new SotA on project implementation and the outlook of its contribution.  ...  info below) -MCUs with advanced security capabilities, including crypto-engines, ARM with a pre-provisioned solution.  ... 
doi:10.5281/zenodo.5256842 fatcat:xf4y27mcjvbwvfjxy7lo4kwqw4

OSCAR: Object security architecture for the Internet of Things

Mališa Vučinić, Bernard Tourancheau, Franck Rousseau, Andrzej Duda, Laurent Damon, Roberto Guizzetti
2015 Ad hoc networks  
We rely on secure channels established by means of (D)TLS for key exchange, but we get rid of the notion of the "state" among communicating entities.  ...  We provide a mechanism to protect from replay attacks by coupling our scheme with the CoAP application protocol.  ...  This work has lately been integrated with CoAP and released in the open source form [2] . A significant drawback of using DTLS to secure IoT is its incompatibility with multicast traffic.  ... 
doi:10.1016/j.adhoc.2014.12.005 fatcat:tknik2yqqfalrfc3sy6qhydzyq

OSCAR: Object Security Architecture for the Internet of Things [article]

Malisa Vucinic, Bernard Tourancheau, Franck Rousseau, Andrzej Duda (LIG Laboratoire d'Informatique de Grenoble), Laurent Damon, Roberto Guizzetti
2014 arXiv   pre-print
We rely on secure channels established by means of (D)TLS for key exchange, but we get rid of the notion of the 'state' among communicating entities.  ...  We provide a mechanism to protect from replay attacks by coupling our scheme with the CoAP application protocol.  ...  This work has lately been integrated with CoAP and released in the open source form [2] . A significant drawback of using DTLS to secure IoT is its incompatibility with multicast traffic.  ... 
arXiv:1404.7799v1 fatcat:aegyzacczzbizeuftqsud5wlkq

OSCAR: Object security architecture for the Internet of Things

Malisa Vucinic, Bernard Tourancheau, Franck Rousseau, Andrzej Duda, Laurent Damon, Roberto Guizzetti
2014 Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014  
We rely on secure channels established by means of (D)TLS for key exchange, but we get rid of the notion of the "state" among communicating entities.  ...  We provide a mechanism to protect from replay attacks by coupling our scheme with the CoAP application protocol.  ...  This work has lately been integrated with CoAP and released in the open source form [2] . A significant drawback of using DTLS to secure IoT is its incompatibility with multicast traffic.  ... 
doi:10.1109/wowmom.2014.6918975 dblp:conf/wowmom/VucinicTRDDG14 fatcat:es46ct6nujd3fna3vzed7xbv4q

Anatomy of a Vulnerable Fitness Tracking System

Jiska Classen, Daniel Wegemer, Paul Patras, Tom Spink, Matthias Hollick
2018 Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies  
As a market leader, Fitbit has developed perhaps the most secure wearables architecture that guards communication with end-to-end encryption.  ...  We demonstrate that users can tamper with both the app and firmware to selfishly manipulate records or circumvent Fitbit's walled garden business model, making the case for an independent, user-controlled  ...  We thank the Fitbit security team for their professional collaboration and acknowledging our work along with their security fixes.  ... 
doi:10.1145/3191737 fatcat:wzz6zzmrmzcedb4efg52fckrqi

From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive Data

Q. Tang
2014 Computer journal  
Timed-Release Encryption The concept of Timed-Release Encryption (TRE), i.e. sending a message which can only be decrypted after a pre-defined release time, is attributed to May [9].  ...  Moreover, we propose a security model for Timed-Ephemerizer and formalize relevant security properties. We also propose a new Timed-Ephemerizer protocol and prove its security in the security model.  ...  Pre-Open Capability which allows the message sender to assist the receiver to decrypt the ciphertext before the pre-defined disclosure time.  ... 
doi:10.1093/comjnl/bxu030 fatcat:htptv3webngadmrdrudpipoeyq

AGREE: exploiting energy harvesting to support data-centric access control in WSNs

Giuseppe Bianchi, Angelo T. Capossele, Chiara Petrioli, Dora Spenza
2013 Ad hoc networks  
energy harvesting opportunities to pre-compute and cache suitably chosen CP-ABE-encrypted keys, so as to minimize the need to perform CP-ABE encryptions when no energy from harvesting is available.  ...  This work is motivated by a general question: can energy harvesting capabilities embedded in modern sensor nodes be exploited so as to support security mechanisms which otherwise would be too demanding  ...  : Integrated appRoach for hOme, mobile and clinical eNvironments) and by the PRIN project TENACE.  ... 
doi:10.1016/j.adhoc.2013.03.013 fatcat:egsynhqt6ndwxowscynhixzlha

Revisiting Software Protection [chapter]

Paul C. van Oorschot
2003 Lecture Notes in Computer Science  
We review the early literature in the area plus recent activities related to trusted platforms, and discuss challenges and future directions.  ...  Version 1.0 of the TCPA specifications were released early in 2001, defining the core security funcationality of a trusted subsystem for computing platforms, intended to "create a foundation of trust for  ...  complexity-theory as a basis for security analysis, definitions of efficiency, and security through obscurity. §5 reviews recent directions in the related area of enhancing platform security with low-cost  ... 
doi:10.1007/10958513_1 fatcat:5hjupbqp5bgvxdrt2tlkeprr6i

D2.2 The COLLABS Level-3 Security Package for Secure Digital Supply Networks: 1st complete version

Panagiotis Rizomiliotis, Konstantinos Tserpes, Aikaterini Triakosia
2021 Zenodo  
It describes and demonstrates the various technologies that form the COLLABS Level-3 security package for secure digital supply networks.  ...  This the second deliverable of Work Package 2 tasks T2.1 (Tools and methods for secure data sharing), T2.2 (Trustworthiness of data flows), T2.3 (Machine learning-based cognitive security framework), T2.4  ...  These models start with pre-trained parameters and are updated over time using the previously monitored traffic. A Pre-processor component first parses the packets and extracts relevant features.  ... 
doi:10.5281/zenodo.5667012 fatcat:xgzhqfeq6nbwte4h256pntlkau

D3.2 - Annual Releases of the TheFSM Data Platform

Danai Vergeti, Dimitris Ntalaperas, Iosif Angelidis
2021 Zenodo  
for the services of TheFSM backbone infrastructure, we present TheFSM platform's prototype for M12 and additional low-fidelity mock-ups which were designed for all the main functionalities of the data  ...  The current document entitled "Annual Release of TheFSM Data Platform" constitutes an accompanied report of TheFSM Platfrom demonstrator providing the preliminary efforts undertaken within the context  ...  set of pre-built policies in the platform for fine-grained access.  ... 
doi:10.5281/zenodo.4593668 fatcat:vesfhc4h4ne7lnagtheotaswka

The Second Named Data Networking Community Meeting (NDNcomm 2015)

Alexander Afanasyev, Yingi Yu, Lixia Zhang, Jeff Burke, kc claffy, Joshua Polterock
2016 Computer communication review  
NDN forwarding, routing, and security, and to provide feedback to the NDN architecture design evolution.  ...  The meeting provided a platform for the attendees from 49 institutions across 13 countries to exchange their recent NDN research and development results, to debate existing and proposed functionality in  ...  We thank the NDNcomm Program Committee members for their effort of putting together an excellent program. We thank all participants for their insights and feedback at the workshop.  ... 
doi:10.1145/2875951.2875961 fatcat:4wamzw6cazb5jmyrn6abd24ybu
« Previous Showing results 1 — 15 out of 2,385 results