40,295 Hits in 5.4 sec

Strongly-Secure Identity-Based Key Agreement and Anonymous Extension [chapter]

Sherman S. M. Chow, Kim-Kwang Raymond Choo
Lecture Notes in Computer Science  
We study the provable security of identity-based (ID-based) key agreement protocols.  ...  In anonymous key agreement protocols such as the protocols of Boyd and Park [8] and of Shoup [32], U's identity is not known to anyone in the network except V -the recipient entity in the key agreement  ...  the anonymous reviewers for their invaluable feedback.  ... 
doi:10.1007/978-3-540-75496-1_14 fatcat:dhfhhivomjdrnjkd5s6746soym

AIB-OR: Improving Onion Routing Circuit Construction Using Anonymous Identity-Based Cryptosystems

Changji Wang, Dongyuan Shi, Xilei Xu, Gaoxi Xiao
2015 PLoS ONE  
In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identitybased one-way anonymous key agreement (IBOWAKE) protocol.  ...  We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity.  ...  Acknowledgments The authors would like to thank the editors and the anonymous reviewers of this paper for their valuable comments and suggestions while at the same time helping us to improve the English  ... 
doi:10.1371/journal.pone.0121226 pmid:25815879 pmcid:PMC4376715 fatcat:dwja3qh2qnbv3itofjivbfziou

Mobile anonymity of dynamic groups in vehicular networks

Yong Xi, Weisong Shi, Loren Schwiebert
2008 Security and Communication Networks  
To quantify the achievable anonymity, we first define a graph-based model called mobile anonymity for a general dynamic environment.  ...  We show that under this model, anonymity can be achieved on the system level as long as the constructed anonymity graph is strongly connected.  ...  Each vehicle has a public key Q ID = H(ID), which is generated by applying secure hash function H over its identity ID. Each vehicle obtains its secret key from KGC by submitting its ID.  ... 
doi:10.1002/sec.28 fatcat:g4yfnhhncnecfbs46bh435e4zu

Anonymity and one-way authentication in key exchange protocols

Ian Goldberg, Douglas Stebila, Berkant Ustaoglu
2012 Designs, Codes and Cryptography  
It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication.  ...  We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties.  ...  Goldberg acknowledges the financial support of the Natural Sciences and Engineering Research Council (NSERC) of Canada and Mprime.  ... 
doi:10.1007/s10623-011-9604-z fatcat:tgxqgbvrszedpj2rxfkizlf2di

Architecting Adaptable Security Infrastructures for Pervasive Networks through Components [chapter]

Marc Lacoste
2009 Communications in Computer and Information Science  
This is possible with component-based security architecture. We illustrate the benefits of this approach by presenting AMISEC, an integrated authentication and authorization middleware.  ...  of design, deployment, and execution.  ...  ; or to an AA issuing AACs based on group signatures (AA 1 ) to be moderately anonymous; or again to an AA issuing AACs based on fair-blind signatures (AA 2 ) to be strongly anonymous, assuming in this  ... 
doi:10.1007/978-3-642-10844-0_34 fatcat:2g3trfavdffyhbmh4iiuw7yoh4

Removing Escrow from Identity-Based Encryption [chapter]

Sherman S. M. Chow
2009 Lecture Notes in Computer Science  
Key escrow is inherent in identity-based encryption (IBE). A curious key generation center (KGC) can simply generate the user's private key to decrypt a ciphertext.  ...  Second, we propose a new system architecture with an anonymous private key generation protocol such that the KGC can issue a private key to an authenticated user without knowing the list of users identities  ...  We propose a new system architecture with an anonymous key issuing (AKI) protocol to protect the confidentiality of the users identities.  ... 
doi:10.1007/978-3-642-00468-1_15 fatcat:y3w6wwgdmrfbvhncy3rd3ecy7a

A Study on Implementation and Design of Scheme to Securely Circulate Digital Contents
디지털콘텐츠의 안전한 유통을 위한 구조 설계 및 구현에 관한 연구

Yong Kim, Eun-Jeong Kim
2009 Journal of the Korean Society for information Management  
With explosive growth in the area of the Internet and IT services, various types of digital contents are generated and circulated, for instance, as converted into digital-typed, secure electronic records  ...  For secure delivery and use of digital contents in on/off environment, this paper proposes that 1) how to generate e-tickets in a remote e-ticket server, 2) how to authenticate a user and a smart card  ...  Associate professor, Dept. of Library and Information Science, ChonBuk National Univ ( Senior Researcher, KT Service Incubation Office(  ... 
doi:10.3743/kosim.2009.26.2.027 fatcat:u3dbzijsa5ad3dq66z3cyntona

On the generic construction of identity-based signatures with additional properties

Eike Kiltz, Javier Herranz, David Galindo
2010 Advances in Mathematics of Communications  
; (strongly) key insulated signatures; online/offline signatures; threshold signatures; and (with some limitations) aggregate signatures.  ...  In this paper we consider the following natural extension: is there a generic construction of "identity-based signature schemes with additional properties" (such as identity-based blind signatures, verifiably  ...  Acknowledgements We thank the anonymous referees for their comments that helped improving the presentation of our results.  ... 
doi:10.3934/amc.2010.4.453 fatcat:zpdvgtqncvdcpiwjqzox3723ei

Digital signature scheme for information non-repudiation in blockchain: a state of the art review

Weidong Fang, Wei Chen, Wuxiong Zhang, Jun Pei, Weiwei Gao, Guohui Wang
2020 EURASIP Journal on Wireless Communications and Networking  
methods, security, and performance.  ...  The interesting characteristics of blockchain are decentralized ledger and strong security, while non-repudiation is the important property of information security in blockchain.  ...  Authors' contributions The six authors of the paper have extensively participated in all of the paper writing. WF mainly worked on the researched. WZ, WC, and JP revised this paper.  ... 
doi:10.1186/s13638-020-01665-w fatcat:wnp4uxzixzfzngxnerlkbewame

On the Generic Construction of Identity-Based Signatures with Additional Properties [chapter]

David Galindo, Javier Herranz, Eike Kiltz
2006 Lecture Notes in Computer Science  
; (strongly) key insulated signatures; online/offline signatures; threshold signatures; and (with some limitations) aggregate signatures.  ...  In this paper we consider the following natural extension: is there a generic construction of "identity-based signature schemes with additional properties" (such as identity-based blind signatures, verifiably  ...  Acknowledgements We thank the anonymous referees for their comments that helped improving the presentation of our results.  ... 
doi:10.1007/11935230_12 fatcat:xmzndw3plzhqhbk4ryc5g6wb34

Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts [chapter]

Nelly Fazio, Irippuge Milinda Perera
2012 Lecture Notes in Computer Science  
In particular, we formalize the notion of outsider-anonymous broadcast encryption (oABE), and describe a generic construction based on any anonymous identity-based encryption (AIBE) scheme.  ...  Sect. 2 provides a brief review of the Subset Cover Framework [28] and of anonymous identity-based encryption [2, 22] .  ...  Ministry of Defence and was accomplished under Agreement Number W911NF-06-3-0001.  ... 
doi:10.1007/978-3-642-30057-8_14 fatcat:p47we3s6sbbdrgeldcqw55a6r4

Argumentative Negotiations with Anonymous Informer Agents

Javier Carbo, José M. Molina, Jorge Davila
2002 Information & Security An International Journal  
Achieving anonymity Due to the secret nature of the information, informer agents will probably desire anonymity until an agreement is not yet reached, and while negotiation is still in progress.  ...  The inclusion of the identity public key (PKid) satisfies integrity, non-repudiation, authentication, and it may be affordable.  ... 
doi:10.11610/isij.0811 fatcat:hygag6bvhrfdbhzt2hkfiav3cy

The Clean Privacy Ecosystem of the Future Internet

Lothar Fritsch
2013 Future Internet  
Based on a short review of security models and the development of privacy-enhancing technology, privacy and electronic identities will be discussed as parts of a larger context-an ecosystem of personal  ...  information and electronic identities.  ...  authentication, blind attestation and secure group agreement.  ... 
doi:10.3390/fi5010034 fatcat:qrtavj3warg7fgrplr4alcyzzi


Finally, it was suggested to develop a robust framework that can provide enhanced security with reduced overhead and ensure data integrity.  ...  From the extensive study, it was found that the overhead on the computational and communication overhead increase proportionally with an increase in the number of the user during the group signature generation  ...  Thus, a new scheme in anonymizing and signing the access policy agreement was recommended, and it was secure against indistinguishable CCA.  ... 
doi:10.34218/ijcet.10.6.2019.002 fatcat:mayl46n4cnda5fctaemzlpwpna

G-Merkle: A Hash-Based Group Signature Scheme from Standard Assumptions [chapter]

Rachid El Bansarkhani, Rafael Misoczki
2018 Lecture Notes in Computer Science  
This directly translates into fast signing and verification engines. Different from lattice-based counterparts, our construction does not require any random oracle.  ...  Group signatures allow a group member to anonymously sign messages on behalf of the whole group (as needed for anonymous remote attestation).  ...  Acknowledgements We thank Andreas Hülsing for engaging in helpful discussions and the anonymous reviewers for providing detailed comments.  ... 
doi:10.1007/978-3-319-79063-3_21 fatcat:4mpqtc4nove3vaqeej2b7ubhpe
« Previous Showing results 1 — 15 out of 40,295 results