Filters








1,900 Hits in 2.7 sec

Scalable public-key tracing and revoking

Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung
2005 Distributed computing  
Previous work on public-key traitor tracing did not address the dynamic scenario thoroughly: no efficient scalable public-key traitor tracing scheme has been proposed, in which the populations of providers  ...  To address these issues, we introduce a formal model for Scalable Public-Key Traitor Tracing, and present the first construction of such a scheme.  ...  We thank one of the anonymous reviewers for pointing out a flaw in an early version [10] of our scheme, and we thank all the reviewers for their helpful comments that improved the readability and exposition  ... 
doi:10.1007/s00446-004-0120-5 fatcat:di4k4nyvkreexd2w7rrshfqqfu

Scalable public-key tracing and revoking

Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung
2003 Proceedings of the twenty-second annual symposium on Principles of distributed computing - PODC '03  
Previous work on public-key traitor tracing did not address the dynamic scenario thoroughly: no efficient scalable public-key traitor tracing scheme has been proposed, in which the populations of providers  ...  To address these issues, we introduce a formal model for Scalable Public-Key Traitor Tracing, and present the first construction of such a scheme.  ...  We thank one of the anonymous reviewers for pointing out a flaw in an early version [10] of our scheme, and we thank all the reviewers for their helpful comments that improved the readability and exposition  ... 
doi:10.1145/872035.872062 dblp:conf/podc/DodisFKY03 fatcat:urvoaiwlzfbsfg7exp54otlxwm

Linear Code Implies Public-Key Traitor Tracing with Revocation [chapter]

Vu Dong Tô, Reihaneh Safavi-Naini
2004 Lecture Notes in Computer Science  
The overhead of the modified scheme is very efficient: there is no extra user secret key storage, the public encryption key size remains the same, and the ciphertext size is of length O(k).  ...  PKC'02, LNCS 2274, pp. 172-187, 2002] that a public-key (k, n)-traitor tracing scheme, called linear-coded Kurosawa-Desmedt scheme, can be derived from an [n, u, d]-linear code such that d ≥ 2k + 1.  ...  It remains as an open problem to design a public key traitor tracing with revocation which is fully scalable.  ... 
doi:10.1007/978-3-540-27800-9_3 fatcat:dyxdw3ngyvhlvaqsaqchfjdcgq

Scalable security for petascale parallel file systems

Andrew W. Leung, Ethan L. Miller, Stephanie Jones
2007 Proceedings of the 2007 ACM/IEEE conference on Supercomputing - SC '07  
Automatic Revocation uses short capability lifetimes to allow capability expiration to act as global revocation, while supporting non-revoked capability renewal.  ...  To address these issues, we developed Maat, a security protocol designed to provide strong, scalable security to these systems. Maat introduces three new techniques.  ...  Technology, Symantec, and Yahoo.  ... 
doi:10.1145/1362622.1362644 dblp:conf/sc/LeungMJ07 fatcat:7jtbpcemhbhbbf3emiopmnc66m

Revocation Protocol for Group Signatures in VANETs: A Secure Construction

2020 KSII Transactions on Internet and Information Systems  
The theoretical analysis and simulation results demonstrate our work is secure against adversaries and achieves performance efficiency and scalability.  ...  In order to protect VANETs against misbehaviours, one of the vital security requirements is to revoke the misbehaved vehicles from the network.  ...  Then, we generate and send to ℬ where is ℛℳ's public key.  ... 
doi:10.3837/tiis.2020.01.017 fatcat:crq35edsanhsvlxmsbqumihq5e

SSKM: Scalable and Secure Key Management Scheme for Group Signature Based Authentication and CRL in VANET

Kiho Lim, Weihua Liu, Xiwei Wang, Jingon Joung
2019 Electronics  
Our experiment results demonstrate a scalable, efficient, and secure key distribution scheme in vehicular networking.  ...  Similarly, through utilizing the two Bloom filters in our hierarchical topology, an efficient and scalable vehicle revocation mechanism can be achieved that can minimize the CRL size.  ...  Furthermore, if a legitimate vehicle tried to launch the man-in-the-middle attack using the public/private key pair generated by the TA, then the L-RSU and the TA could trace the identity of the vehicle  ... 
doi:10.3390/electronics8111330 fatcat:z75lfnxhprandcfo6l6cicigbq

Generic Transformation for Scalable Broadcast Encryption Schemes [chapter]

Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
2005 Lecture Notes in Computer Science  
n r) transmission, at the same time, where n is the number of users and r is the number of revoked users.  ...  The first instance is comparable to the results of the "stratified subset difference (SSD)" technique by Goodrich et al. and firstly achieves O(log n) storage, O(log n) computation, and O( log n log log  ...  Generally BE schemes are classified into two types: symmetric key and public key based BE schemes.  ... 
doi:10.1007/11535218_17 fatcat:ahnsmmfxfjfj7nytadadi76liy

A Practical and Extendible VANETs Privacy-Preserving System

Tao Yang, Jian-Bin Hu, Zhong Chen
2013 Journal of Automation and Control Engineering  
The proposed system is based on the key technologies such as TP4RS protocol, and achieves some good features: the system not only can provide good identity and location privacy protecting for the vehicles  ...  , but also can be implemented and deployed well because of its practical design and expandability.  ...  Furthermore, when the number of revoked vehicles in the revocation list is larger than some threshold, it requires every remaining vehicle to calculate a new private key and group public key based on the  ... 
doi:10.12720/joace.1.2.166-169 fatcat:pasgdrbohzfobbiorkchaavgay

SAMcast - A Scalable, Secure and Authenticated Multicast Protocol for Large Scale P2P Networks

W. Ahmad, A. Khokhar
2007 2007 IEEE International Conference on Communications  
The users are also discouraged from indulging in illegal distribution of copyrighted material by employing an efficient public key based broadcast encryption scheme along with a deterministic traitor tracing  ...  Our experiment results show that the proposed broadcast encryption scheme is highly scalable and the integrity verification is extremely efficient both in terms of computation and communication.  ...  ACKNOWLEDGEMENTS This work was partially supported by the following NSF grants: CNS-0646819 and IIS-0534438.  ... 
doi:10.1109/icc.2007.248 dblp:conf/icc/AhmadK07 fatcat:psktembrjjcrjg473rse74csgi

Efficient Privacy-Preserving Authentication Protocol for Vehicular Communications with Trustworthy [article]

Hu Xiong, Jianbin Hu, Tao Yang, Wei Xin, Zhong Chen
2010 arXiv   pre-print
key.  ...  protocol is characterized by the Trusted Authority (TA) designating the Roadside Units (RSUs) to translate signatures computed by the On-Board Units (OBUs) into one that are valid with respect to TA's public  ...  and group public key when the number of revoked vehicles is larger than some threshold.  ... 
arXiv:1008.5015v1 fatcat:irf7exgzdzbe3k4rkl6xvgtg7i

Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications [article]

Hu Xiong, Matei Ripeanu, Zhiguang Qin
2009 arXiv   pre-print
Third, it is efficient by offering fast message authentication and verification, cost-effective identity tracking in case of a dispute, and low storage requirements.  ...  This paper introduces an efficient and spontaneous privacy-preserving protocol for vehicular ad-hoc networks based on revocable ring signature.  ...  Both in our protocol and GSB protocol, each OBU stores one private key issued by the trusted party, and m revoked public keys in the revocation list.  ... 
arXiv:0909.1590v1 fatcat:hqq2qxbo5jalfhmswrx6qqq6oy

Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy

Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Di Ma, Shanbiao Wang
2013 IEEE Transactions on Information Forensics and Security  
In addition, several advanced features, such as role or user revocation, tracing, and anonymity, are implemented as well.  ...  Index Terms-Security, access control, role-based cryptosystem, role-key hierarchy, role and user revocation.  ...  The authors thank Zexing Hu and Huaixi Wang, two students at Peking University, for discussing and verifying the scheme using the C++ language.  ... 
doi:10.1109/tifs.2013.2287858 fatcat:aedohc45rfeodnojhi7rsf2oeu

Towards deploying a scalable & robust vehicular identity and credential management infrastructure

Mohammad Khodaei, Hongyu Jin, Panos Papadimitratos
2014 2014 IEEE Vehicular Networking Conference (VNC)  
There is a growing consensus towards deploying a Vehicular Public-Key Infrastructure (VPKI) enables pseudonymous authentication, with standardization efforts in that direction.  ...  Equally important, there is limited experimental work that establishes the VPKI efficiency and scalability. In this paper, we are concerned with exactly these issues.  ...  CoPRA [28] stores resolution IDs, the hash of each short-term public key and a random number, at both the LTCA and the PCA; the honest-but-curious LTCA can easily calculate hashes of any public key from  ... 
doi:10.1109/vnc.2014.7013306 dblp:conf/vnc/KhodaeiJP14 fatcat:noxbaxscxvftnanyejg3lne5cy

Autonomous Certification with List-Based Revocation for Secure V2V Communication [chapter]

Anup Kumar Bhattacharya, Abhijit Das, Dipanwita Roychoudhury, Aravind Iyer, Debojyoti Bhattacharya
2012 Lecture Notes in Computer Science  
Pseudonymous Public Key Infrastructure (PPKI), an extension of standard PKI, has been proposed to achieve these security attributes.  ...  However, user revocation in PKI+ is rather inconvenient, since it requires the entire network of non-revoked users to be reconfigured after each such event.  ...  Weerasinghe and Fu propose an efficient and scalable authentication protocol [14] for VANET. Vehicles generate keys and certificates using a short-term au-thorization certificate from the CA.  ... 
doi:10.1007/978-3-642-35130-3_15 fatcat:kbiihi7zdjepnfyin27ukrryyq

CRUPA: collusion resistant user revocable public auditing of shared data in cloud

Geeta C. Mara, Usharani Rathod, Shreyas Raju R. G., Raghavendra S., Rajkumar Buyya, Venugopal K. R., S. S. Iyengar, L. M. Patnaik
2020 Journal of Cloud Computing: Advances, Systems and Applications  
Further, the CSP audits and re-signs the revoked customer chunks using the Re − sign key.  ...  Further, the CSP audits and re-signs the revoked customer chunks by utilizing the Re − sign key.  ...  Acknowledgments We sincerely thank the Reviewers and the Editor for their valuable suggestions. E-Commerce. He is member of International Association of Engineers (IAENG). Raghavendra  ... 
doi:10.1186/s13677-020-00188-5 fatcat:6nk2i3yklbfkxeiqajtd3ntm5m
« Previous Showing results 1 — 15 out of 1,900 results