Filters








5,041 Hits in 4.7 sec

Secure Personalization Using Proxy Cryptography [chapter]

Pierre Girard
2000 Lecture Notes in Computer Science  
In this paper we describe new secure personalization schemes using proxy cryptography.  ...  With this proxy cryptosystem we setup new security schemes for smart cards personalization and we show that they are more secure, flexible and cheap than existing ones.  ...  In this paper, we describe new secure personalization schemes using proxy cryptography.  ... 
doi:10.1007/10721064_30 fatcat:bqc3rnf2wrdf7bjygtn2xdzgyu

A Survey on Remote Data Integrity Checking in PCS with ID-Based Proxy minded Record Uploading

2017 International Journal of Recent Trends in Engineering and Research  
From the security issues, we recommend a singular proxyoriented data uploading and remote data integrity checking version in identity-primarily based public key cryptography: identity-primarily based proxy-oriented  ...  Then, a concrete identity-PUIC protocol is designed using the bilinear pairings. Our identity-PUIC protocol is likewise green and bendy.  ...  In some cases, the some operation is delegated to the third party, as an example proxy. Thus, we've got to use the proxy cryptography. Proxy cryptography may be an important cryptography primitive.  ... 
doi:10.23883/ijrter.2017.3103.r1y1n fatcat:ldryknv4evd33okgj2ty2u5jaq

A distributed key assignment protocol for secure multicast based on proxy cryptography

Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei
2006 Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06  
multicast network that leverages proxy cryptography; and 3) We adopt a hybrid encryption technique that makes our framework more efficient and practical.  ...  A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually one "group key" is shared by all approved members.  ...  Then, using key composition, we propose a distributed key assignment protocol (DKAP) that eliminates the centralized controller used in proxy cryptography-based secure multicast networks.  ... 
doi:10.1145/1128817.1128875 dblp:conf/ccs/HuangCCL06 fatcat:cnjfnxoncrgypfcyqku6dhgjca

Secure and efficient bi-directional proxy re-encyrption technique

B. M. Chandrakala, S. C. Lingareddy
2016 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)  
There has been continuous ongoing research by various cryptanalyst to enhance security of cryptography especially in semi-untrusted server.  ...  To address this work present a Bidirectional Proxy Re-encryption scheme by adopting lattice based cryptography technique.  ...  The Proxy Re-Encryption technique generally assures security (1) that the proxy cannot re-encrypt the cipher data in a useful form before receiving the encryption key, and (2) that neither the receiver  ... 
doi:10.1109/iccicct.2016.7987923 fatcat:kuwqzcztjnaevari5x6cta74ee

A general design towards secure ad-hoc collaboration

Masayuki Nakae, Xinwen Zhang, Ravi Sandhu
2006 Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06  
multicast network that leverages proxy cryptography; and 3) We adopt a hybrid encryption technique that makes our framework more efficient and practical.  ...  A secure multicast framework should only allow authorized members of a group to decrypt received messages; usually one "group key" is shared by all approved members.  ...  Then, using key composition, we propose a distributed key assignment protocol (DKAP) that eliminates the centralized controller used in proxy cryptography-based secure multicast networks.  ... 
doi:10.1145/1128817.1128874 dblp:conf/ccs/NakaeZS06 fatcat:rbrxdc6nnjaz7kgrhdqftfncmu

Organizational Cryptography for Access Control [article]

Masahito Gotaishi, Shigeo Tsujii
2018 IACR Cryptology ePrint Archive  
A cryptosystem for granting/rescinding access permission is proposed, based on elliptic curve cryptography.  ...  The authors appreciate Secure IoT Platform Consortium, which is working on the SCOPE project together with Chuo University, for the fruitful discussions and advices.  ...  Nonetheless, currently most of the security systems using cryptography seem to have difficulty in dynamic access cotrol.  ... 
dblp:journals/iacr/GotaishiT18 fatcat:4napwkle2ncbfifyodoq6gf2aq

A Novel Approach for Data Uploading and Remote Data Integrity Checking Based On Public Key Cryptography

K.Lakshmi Ragini, V.Rani Mounika, K. Sandeep
2017 International Journal of Advanced engineering Management and Science  
From the security problems we propose "A NOVEL APPROACH FOR DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKING BASED ON PUBLIC KEY CRYPTOGRAPHY" (ANDURIC-PKC).  ...  This protocol is efficient and flexible, this may be provably secured by using Computational Diffie-Hellman problem.  ...  In some cases, the cryptologic operation are delegated to the third party, as an example proxy. Thus, we've got to use the proxy cryptography.  ... 
doi:10.24001/ijaems.3.4.9 fatcat:xz2zox4fc5bi3fvynbmrw7lggy

Proxy Smart Card Systems [chapter]

Giuseppe Cattaneo, Pompeo Faruolo, Vincenzo Palazzo, Ivan Visconti
2010 Lecture Notes in Computer Science  
We stress the problematic aspects concerning the use of known proxy-cryptography schemes in synergy with current standard technologies. This in turn motivates the need of proxy smart card systems.  ...  Unfortunately, secure delegation systems proposed so far (e.g., proxy signatures) include various drawbacks for any practical system.  ...  We notice that currently no proxy-cryptography scheme seems to be concretely used in practice.  ... 
doi:10.1007/978-3-642-12368-9_15 fatcat:tzrtd246yzhb7jxmgji3nk3qri

A Dynamic Threshold Proxy Digital Signature Scheme by using RSA Cryptography for Multimedia Authentication

Sharavanan Thanasekkaran, Balasubramanian V
2011 International Journal of Computer Applications  
In this paper we propose a threshold digital signature scheme by using RSA cryptography to authenticate multimedia content.  ...  This scheme is also secure against conspiracy attack.  ...  The threshold proxy signature scheme uses the RSA cryptography to generate the group private and the public key for the group members.  ... 
doi:10.5120/2450-2548 fatcat:xcm7eqt3t5edjhnamoj4aq7lsm

Threshold Delegation Scheme Based on Multi-Proxy Re-Encryption

You-Jin Song
2016 International Journal of Security and Its Applications  
Security weakness against collusion between proxy and delegatee can be prvented by applying such a technique, and re-encryption control by multi-proxy becomes possible.  ...  Proxy re-encryption (PRE) is a re-encryption technique to enable decryption of information encrypted with a delegator's public key by using the delegatee's private key.  ...  ID-based Cryptography Systems An ID-based cryptography system is one that uses a receiver's ID upon encryption [1] .  ... 
doi:10.14257/ijsia.2016.10.7.31 fatcat:v3tsykq5zngsrhpdehddjcqova

A Survey on Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud

2017 International Journal of Science and Research (IJSR)  
From the security issues, we propose a novel proxy arranged information transferring and remote information respectability checking model in personality based open key cryptography: IDPUIC (personality  ...  based proxy situated information transferring and remote information respectability checking in broad daylight cloud).  ...  Personality based open key cryptography can take out the confounded testament administration.  ... 
doi:10.21275/art20164284 fatcat:butrof7jmzgilp24nhox5wvsni

7-4 An Encrypted File Storage System with Hierarchical Levels of Sensitivity and its Applications

Lihua Wang, Takuya Hayashi, Atsushi Waseda, Ryo Nojima, Shiho Moriai
2017 Journal of NICT  
Acknowledgments We are grateful to Technical Researchers Takashi Kurokawa and Sachiko Kanamori of the NICT Security Fundamentals Laboratory for their huge contributions by examining system specifications  ...  On the other hand, when the file is encrypted using the same key shared among all members using symmetric key cryptography (for example AES), then the encryption process is needed only once for all persons  ...  Hybrid encryption: An encryption method that combines public key cryptography and symmetric key cryptography, which uses public key cryptography to deliver the symmetric key which is to be used to encrypt  ... 
doi:10.24812/nictjournal.63.2_215 fatcat:cqfs6usarbegbaaagtsnlcc4mi

Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health

Shikha Mittal, Ankit Bansal, Deepali Gupta, Sapna Juneja, Hamza Turabieh, Mahmoud M Elarabawy, Ashish Sharma, Zelalem Kiros Bitsue, Ziya Uddin
2022 Computational Intelligence and Neuroscience  
In this paper, we propose a novel algorithm along with implementation details as an effective and secure E-health cloud model using identity-based cryptography.  ...  Patients' confidential health records have been encrypted and saved in the cloud using cypher text so far. To ensure privacy and security in a cloud computing environment is a big issue.  ...  In [10] , cloud computing security and privacy were discussed in detail by the authors. Using cryptography techniques, they have made cloud computing more secure.  ... 
doi:10.1155/2022/7016554 pmid:35510050 pmcid:PMC9061039 fatcat:cxljsrodfzdgfcbcnx7odyldyi

Decentralized group key management for dynamic networks using proxy cryptography

Junbeom Hur, Youngjoo Shin, Hyunsoo Yoon
2007 Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks - Q2SWinet '07  
cryptography.  ...  In this study, we propose a decentralized group key management scheme that features a mechanism allowing a service provider to deliver the group key to valid members in a distributed manner using the proxy  ...  In Section 2, several related works for secure group communication are described. In Section 3, a decentralized group key management scheme using proxy cryptography is proposed.  ... 
doi:10.1145/1298239.1298261 dblp:conf/mswim/HurSY07 fatcat:f3oaoqtlq5adlmihrco7hzqwl4

Unique Data Integrity in Public Cloud

Pasupuleti Veeramma, Ford Lumban Gaol, Chi Hao
2013 International Journal of Reliable Information and Assurance  
From the security issues, we propose a novel intermediary situated information transferring and remote information honesty checking model in identity-based public key cryptography: identity-based proxy-oriented  ...  New security issues must be illuminated so as to help more customers process their information out in the open cloud.  ...  personality based intermediary cryptography.  ... 
doi:10.21742/ijria.2013.1.1.04 fatcat:jdjpnhyvhvgnvpsmrhzbzyloli
« Previous Showing results 1 — 15 out of 5,041 results