Filters








17 Hits in 4.9 sec

SoK of Used Cryptography in Blockchain [article]

Mayank Raikwar, Danilo Gligoroski, Katina Kralevska
2019 arXiv   pre-print
The underlying fundaments of blockchain are cryptography and cryptographic concepts that provide reliable and secure decentralized solutions.  ...  To the best of our knowledge, there is no Systematization of Knowledge (SoK) that gives a complete picture of the existing cryptographic concepts which have been deployed or have the potential to be deployed  ...  Aggregate signatures are the non-trivial generalization of multi-signatures (where all users sign the same message).  ... 
arXiv:1906.08609v3 fatcat:l62esrum3bhmfcdxzpx3h3he4e

SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets

C. Rossow, D. Andriesse, T. Werner, B. Stone-Gross, D. Plohmann, C. J. Dietrich, H. Bos
2013 2013 IEEE Symposium on Security and Privacy  
We believe that the results from our analysis can be used to assist security researchers in evaluating mitigation strategies against current and future P2P botnets.  ...  In this paper, we introduce a formal graph model to capture the intrinsic properties and fundamental vulnerabilities of P2P botnets.  ...  This work was supported by the Federal Ministry of Education and Research of Germany (Grant 16BY1110, MoBE), the European Research Council Starting Grant "Rosetta" and the EU FP7-ICT-257007 SysSec project  ... 
doi:10.1109/sp.2013.17 dblp:conf/sp/RossowAWSPDB13 fatcat:cubskjq6kbehhlc3g5ylrtrojq

Generic constructions for universal designated-verifier signatures and identity-based signatures from standard signatures

S.F. Shahandashti, R. Safavi-Naini
2009 IET Information Security  
We also propose a generic construction for identity-based signature schemes from any signature scheme in C and prove that the construction is secure against adaptive chosen message and identity attacks  ...  We give a generic construction for universal designated-verifier signature schemes from a large class, C, of signature schemes. The resulting schemes are efficient and have two important properties.  ...  The first author extends his thanks to the i core Information Security Lab of the University of Calgary for hosting him during part of the work.  ... 
doi:10.1049/iet-ifs.2009.0036 fatcat:ggrfwdhvbbbitj7okjgle6rmme

simTPM: User-centric TPM for Mobile Devices (Technical Report) [article]

Dhiman Chakraborty, Lucjan Hanzlik, Sven Bugiel
2019 arXiv   pre-print
We solve the technical challenge of implementing a TPM2.0 in the resource-constrained SIM card environment and integrate our simTPM into the secure boot chain of the ARM Trusted Firmware on a HiKey960  ...  Trusted Platform Modules are valuable building blocks for security solutions and have also been recognized as beneficial for security on mobile platforms, like smartphones and tablets.  ...  This work is supported by the German Federal Ministry of Education and Research(BMBF) through funding for the Center for IT-Security, Privacy and Accountability (CISPA)(AutSec/FKZ: 16KIS0753) and the CISPA-Stanford  ... 
arXiv:1905.08164v1 fatcat:tnabc6yxlzb3ni7pws55yg6hre

Design of Anonymous Endorsement System in Hyperledger Fabric [article]

Subhra Mazumdar, Sushmita Ruj
2019 arXiv   pre-print
We have implemented the signature scheme in Golang and analyzed its security and performance by varying the RSA (Rivest-Shamir-Adleman) modulus size.  ...  Signature and tag generation time is quite fast and remains constant irrespective of change in message length or endorsement set size for a given RSA modulus value, assuming all the endorsers generates  ...  The signature is computationally indistinguishable from one produced by Sign(Y, M, x) using the real secret key x of signer s on message M , Y being the set of all public keys.  ... 
arXiv:1811.01410v4 fatcat:iskbeoy525hctgtymuxinrsp24

Improved Strongly Deniable Authenticated Key Exchanges for Secure Messaging

Nik Unger, Ian Goldberg
2018 Proceedings on Privacy Enhancing Technologies  
We evaluate concrete instantiations of our DAKEs and show that they are the most efficient strongly deniable schemes; with all of our classical security guarantees, our exchanges require only 1 ms of CPU  ...  In this work, we propose three new strongly deniable key exchange protocols—DAKEZ, ZDH, and XZDH—that are designed to be used in modern secure messaging applications while eliminating the weaknesses of  ...  We gratefully acknowledge the support of NSERC for grants RGPIN-2017-03858 and STPGP-463324-14.  ... 
doi:10.1515/popets-2018-0003 dblp:journals/popets/UngerG18 fatcat:w4k3paha5zcgvkj46gs33zwe4i

Multi-device anonymous authentication

Kamil Kluczniak, Jianfeng Wang, Xiaofeng Chen, Mirosław Kutyłowski
2018 International Journal of Information Security  
The most prominent examples include Pseudonymous Signatures for German personal identity cards and Anonymous Attestation.  ...  Recently, a few pragmatic and privacy protecting systems for authentication in multiple systems have been designed.  ...  , and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.  ... 
doi:10.1007/s10207-018-0406-4 fatcat:pm6uryyn75cdtflqyvxnbvpzbu

Multi-device Anonymous Authentication [chapter]

Kamil Kluczniak, Jianfeng Wang, Xiaofeng Chen, Mirosław Kutyłowski
2016 Lecture Notes in Computer Science  
The most prominent examples include Pseudonymous Signatures for German personal identity cards and Anonymous Attestation.  ...  Recently, a few pragmatic and privacy protecting systems for authentication in multiple systems have been designed.  ...  , and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.  ... 
doi:10.1007/978-3-319-46298-1_2 fatcat:oqw24t2o7jc57aer7fk6zaer7e

Tripartite Key Exchange in the Canetti-Krawczyk Proof Model [chapter]

Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto
2004 Lecture Notes in Computer Science  
A definition of secure multi-party key exchange in the Canetti-Krawczyk proof model is proposed, followed by a proof of the security of the Joux tripartite key agreement protocol according to that definition  ...  The properties and efficiency of the Joux based protocols thus derived are then compared with each other and other published tripartite key agreement protocols.  ...  Acknowledgements: This research is part of an ARC SPIRT project (C10024103) undertaken jointly by Queensland University of Technology and Motorola.  ... 
doi:10.1007/978-3-540-30556-9_3 fatcat:fmeweuvmxjac3a2wlnknnx6ahe

Scaling Distributed Ledgers and Privacy-Preserving Applications [article]

Alberto Sonnino
2021 arXiv   pre-print
This thesis starts by presenting the design and implementation of Chainspace, a distributed ledger that supports user defined smart contracts and execute user-supplied transactions on their objects.  ...  We then build Byzcuit, a new cross-shard consensus protocol that is immune to those attacks and that is tailored to run at the heart of Chainspace.  ...  We also discuss the feasibility of these attacks and their real-world impact.  ... 
arXiv:2102.12273v1 fatcat:3twoaysg7rcj7h4yogwsyyzd34

Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures [chapter]

Siamak F. Shahandashti, Reihaneh Safavi-Naini
Public Key Cryptography – PKC 2008  
We also propose a generic construction for identity-based signature schemes from any signature scheme in C and prove that the construction is secure against adaptive chosen message and identity attacks  ...  We give a generic construction for universal designated-verifier signature schemes from a large class, C, of signature schemes. The resulting schemes are efficient and have two important properties.  ...  The first author extends his thanks to the icore Information Security Lab of the University of Calgary for hosting him during part of this work.  ... 
doi:10.1007/978-3-540-78440-1_8 dblp:conf/pkc/ShahandashtiS08 fatcat:r2cyrlxfpbdetksfhojnf32y24

Security in product lifecycle of IoT devices: A survey

Narges Yousefnezhad, Avleen Malhi, Kary Främling
2020 Journal of Network and Computer Applications  
In that regard, we provide a comprehensive comparison of state-of-the-art surveys in an initial phase which concentrate on distinct parameters required for IoT security.  ...  Consequently, the advancing research related to IoT security, especially with respect to product lifecycle, is explored through state-of-the-art developments in the domain of product lifecycle security  ...  Acknowledgment The research leading to this publication is supported by the European Union's Horizon 2020 research and innovation program (bIoTope; grant 688203 and FINEST TWINS; grant 856602) and Academy  ... 
doi:10.1016/j.jnca.2020.102779 fatcat:junhktapajc75px3n2x6j7tzou

Integrated Technologies for Communication Security and Secure Deletion on Android Smartphones

Alexandre Melo Braga, Daniela Schwab, Eduardo Moraes De Morais, Zanco Neto, André Vannucci
International Journal on Advances in Security   unpublished
with an encrypted file system, and the addition of secure deletion technologies.  ...  The main contribution of this paper is to describe design and implementation issues concerning the construction of an integrated framework for securing both communication and storage of sensitive information  ...  -FUNTTELof the Brazilian Ministry of Communications, through Agreement Nr. 01.11.0028.00 with the Financier of Studies and Projects -FINEP/MCTI.  ... 
fatcat:xvuejawlcbfjbaumxrs6wkwrem

Practical Private Set Intersection Protocols for Privacy-Preserving Applications

Christian Weinert
2021
While this simple functionality turns out to be instrumental for many real-world applications, existing protocol designs and implementations unfortunately incur an impractical computation and/or communication  ...  Private set intersection (PSI) protocols are cryptographic protocols that allow two parties to securely compute the intersection of their private input sets without disclosing elements outside of the intersection  ...  This work has been co-funded by the DFG as part of project E4 within the CRC 1119 CROSSING and by the German Federal  ... 
doi:10.26083/tuprints-00019295 fatcat:mcrri3mvh5a3jois3hzpolx3ae

Resilient payment systems

Khaled Baqer, Apollo-University Of Cambridge Repository, Apollo-University Of Cambridge Repository, Ross Anderson
2018
We focus on issues related to network problems and attacks, system resilience, and scalability by introducing the ability to process payments offline without relying on the availability of network coverage  ...  Towards creating more resilient payment systems, we investigated issues related to security engineering in general, and payment systems in particular.  ...  I'm really grateful for all the great discussions and support; they have enriched my experience at the Lab.  ... 
doi:10.17863/cam.32372 fatcat:mqjlvtlnmnhmnjeewt7tolpsja
« Previous Showing results 1 — 15 out of 17 results