392 Hits in 3.9 sec

Time Constraint Delegation for P2P Data Decryption [chapter]

Tie-Yan Li
2004 Lecture Notes in Computer Science  
Observing the need for this new kind of delegation decryption service, we propose a novel time constraint delegation scheme for decrypting p2p data in this paper.  ...  The new features of the delegation scheme are that: it uses a flexible secure mobile agent solution without designated delegation server; the time constraint conditional parameter is clearly bound with  ...  I Also thank the anonymous referees for their helpful reviews.  ... 
doi:10.1007/978-3-540-39881-3_16 fatcat:krhnmslqancdzirslv4vqryyxa

Exploiting Caching, Proxy Re-encryption, Incentives, and Wi–Fi Direct for Authorized Content Distribution

Nikos Fotiou, George C. Polyzos
2016 Procedia Computer Science  
Direct cellular network connectivity of mobile devices is not always possible or desirable, for various reasons.  ...  The authors thank Anna Tsolakou for contributions to early implementations of the system.  ...  Decrypt: takes as input CID, the corresponding private decryption key. SKID, and returns M.  ... 
doi:10.1016/j.procs.2016.09.014 fatcat:bjsyxxmm3fdmjm62l5teqxeroa

OblivP2P: An Oblivious Peer-to-Peer Content Sharing System

Yaoqi Jia, Tarik Moataz, Shruti Tople, Prateek Saxena
2016 USENIX Security Symposium  
Our approach advocates for hiding data access patterns, making P2P systems oblivious. We propose OBLIVP2Pa construction for a scalable distributed ORAM protocol, usable in a real P2P setting.  ...  A number of content-sharing P2P systems, for file-sharing applications (e.g., BitTorrent and Storj) and more recent peer-assisted CDNs (e.g., Akamai Netsession), are finding wide deployment.  ...  We thank the anonymous reviewers of this paper for their helpful feedback.  ... 
dblp:conf/uss/JiaMTS16 fatcat:ky4k64icjrfetg6t7p4fai6gta

Delegated Proof of Accessibility (DPoAC): A Novel Consensus Protocol for Blockchain Systems

Manpreet Kaur, Shikha Gupta, Deepak Kumar, Chaman Verma, Bogdan-Constantin Neagu, Maria Simona Raboaca
2022 Mathematics  
Therefore, we introduce Delegated Proof of Accessibility (DPoAC), a new consensus technique that employs secret sharing, PoS with random selection, and an interplanetary file system (IPFS).DPoAC is decomposed  ...  However, the primary constraint for DPoS in IoT environments is its reliance on economic stakes to select delegates [28] .  ...  • Miner Nodes: Nodes with specialized capabilities that are capable of revealing the secret number generated by the delegated super node within time constraints.  ... 
doi:10.3390/math10132336 fatcat:jp6nlaatjjgchn6nkmdfnvia2i

Fair Delegation of Digital Services Without Third Parties

Andreas Guillot, Fabrice Theoleyre, Cristel Pelsser
2021 2021 IEEE Symposium on Computers and Communications (ISCC)  
Moreover, some parts may be specialized, and a customer may choose to delegate a task to a service provider.  ...  [4] propose an optimistic protocol for fair exchange in p2p file sharing.  ...  Our contributions, which address all these constraints, are the following: 1) Fair Service Delegation: We propose a protocol where customers delegate services to service providers; 2) Proofs of fairness  ... 
doi:10.1109/iscc53001.2021.9631431 fatcat:t27agtwjtrfsdfwytiaaijjhqm

N2N: A Layer Two Peer-to-Peer VPN [chapter]

Luca Deri, Richard Andrews
2008 Lecture Notes in Computer Science  
The Internet was originally designed as a flat data network delivering a multitude of protocols and services between equal peers.  ...  From the user's perspective, the Internet is not an open transport system, but rather a telephony-like communication medium for content consumption.  ...  Acknowledgment and Code Availability The authors would like to thank Simone Benvenuti, Carlo Rogialli and Maria Teresa Allegro for their help and suggestions during N2N development.  ... 
doi:10.1007/978-3-540-70587-1_5 fatcat:fsklsx72ljcpheexlbo6pdhwae

Policy-driven role-based access management for ad-hoc collaboration

Gail-Joon Ahn, Jing Jin, Mohamed Shehab
2012 Journal of Computer Security  
Our framework incorporates a role-based approach to leverage the originator control, delegation and dissemination control.  ...  A trust awareness feature is integrated for dynamic user-role assignment based on user attributes.  ...  In terms of the Delegation constraint, a simple Boolean indicator is defined to restrict the further delegation. A credential is valid when a true value is derived from all Context constraints.  ... 
doi:10.3233/jcs-2012-0446 fatcat:p6xhrnmwzvewvdfqjlwgwmfvfy

DelegaTEE: Brokered Delegation Using Trusted Execution Environments

Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun
2018 USENIX Security Symposium  
Scalability for all other supported services except video streaming is generally not a constraint.  ...  Enclaves can save confidential data across executions trough sealing, a process for encrypting and authenticating enclave data for persistent storage [2] controlled by the untrusted OS.  ...  Receiving and sending emails using delegated credentials can be done with our mail client for DELEGATEE. It allows to view the inbox and read single mails of the delegated mail account (Figure 7a ).  ... 
dblp:conf/uss/MateticSMJC18 fatcat:kxgh7es42vaofbhb6rgnadu4mm

Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey

Jeevitha B., Thriveni J., Venugopal K.
2016 International Journal of Computer Applications  
and consistency of data stored. ] propose a lightweight encryption algorithm and a security handshaking protocol for mobile devices and data security is achieved from client side before it is sent to  ...  In searchable encryption scheme [112] , the encryption for index is done by using 1) For every keyword, token is given for the encrypted files that contain keyword pointers that is retrieved and  ...  performs partial decryption task delegated by data user without knowing anything about plaintext and keywords embedded in trapdoor Secure against chosen-plaintext attack Does not provide  ... 
doi:10.5120/ijca2016912513 fatcat:y2hdci4lkrhkpfwbnykkibvhqi

Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation

David Nuñez, Isaac Agudo, Javier Lopez
2017 Journal of Network and Computer Applications  
Thus, it serves as a means for delegating decryption rights, opening up many possible applications that require of delegated access to encrypted data.  ...  Finally, we discuss some applications of proxy re-encryption, with a focus on secure access delegation in the cloud.  ...  Some schemes take the temporal dimension into consideration, so the delegation of decryption rights is only valid for a specific period of time.  ... 
doi:10.1016/j.jnca.2017.03.005 fatcat:wlmfwffpwffnjhkopjuwg4yqfe

A Survey of Security Middleware for Pervasive and Ubiquitous Systems

Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah Al-Abdouli, Nader Mohamed
2009 2009 International Conference on Network-Based Information Systems  
This is due to the high levels of personal and private data sharing in these systems.  ...  Middleware is an essential component in this field and recently more emphasis has been put on security middleware as an enabling component for pervasive and ubiquitous applications.  ...  It uses trust-based frameworks that add a security layer for data sharing, permission management, access control and right delegation issues.  ... 
doi:10.1109/nbis.2009.31 dblp:conf/nbis/Al-JaroodiAAM09 fatcat:5mpt4b24cjhynhop3dveyrw6ve

Towards peer-to-peer-based cryptanalysis

Matthaus Wander, Arno Wacker, Torben Weis
2010 IEEE Local Computer Network Conference  
In this paper we propose the usage of peer-to-peer (P2P) technology for distributed cryptanalytic calculations.  ...  Our contribution in this paper is three-fold: We first identify the challenges resulting from this approach and provide a classification of algorithms suited for P2P-based computation.  ...  This may or may not be suitable for P2P computing, depending on 1) how large the overlappings and the saved computing times are, 2) how often the intermediate result data is updated and how large the updates  ... 
doi:10.1109/lcn.2010.5735672 dblp:conf/lcn/WanderWW10 fatcat:nqsel5sqdnfejl7xuyq7asjuv4

Towards Secure Mobile P2P Systems

James Walkerdine, Simon Lock
2007 Second International Conference on Internet and Web Applications and Services (ICIW'07)  
However, the nature of mobile devices brings additional issues that need to be considered, especially for when considering system security.  ...  A core part of this support is with the design and development of a mobile P2P security platform.  ...  mobile device leaving the relevant location or being on the device for too long a time) Authentication based on temporal / geographic constraints To provide lifetime control on temporary authorisation  ... 
doi:10.1109/iciw.2007.64 dblp:conf/iciw/WalkerdineL07 fatcat:bcm4xx6jb5grjgddvjazlqvdqe

A lightweight and efficient Secure Hybrid RSA (SHRSA) messaging scheme with four-layered authentication stack

A. Bhattacharjya, X. Zhong, X. Li
2019 IEEE Access  
For virtual private network and LAN-to-LAN tunnel sessions, End-to-End security is the main constraint in private messaging scenarios.  ...  Its decryption average time has gained 8.858 times compared to the main RSA and gained 2.248 times compared to CRT RSA.  ...  Wang Jing for his constant supervision and encouragement for this project.  ... 
doi:10.1109/access.2019.2900300 fatcat:3pr4j5coevfhld35pv54iegjxu

Security Model for Large Scale Content Distribution Applied to Federated Virtual Environments [chapter]

Adam Wójtowicz
2013 Lecture Notes in Business Information Processing  
In consequence, the model allows for placing content safely on virtual environment hosts and mitigates the problem of the host code that can be malicious.  ...  The decryption keys, shared with threshold schemes, are produced in particles that correspond to the subsets of the multimedia content with respect to its structure.  ...  and inter-role relations, hierarchies, and constraints (e.g. separation of duties), in the key generation process.  ... 
doi:10.1007/978-3-642-38490-5_45 fatcat:rl3pcpa6mnbcrkb2uz22fiipwi
« Previous Showing results 1 — 15 out of 392 results