首页 > 最新文献

2008 International Symposium on Electronic Commerce and Security最新文献

英文 中文
Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme 基于Bellare-Miner方案的服务器辅助前向安全签名构建
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.44
Jia Yu, Fanyu Kong, Rong Hao, Dexiang Zhang
In this paper, we propose two server-assisted forward secure signature schemes using Bellare-Miner Scheme. In the first scheme, the user (signer) can employ a server to help her to produce a signature. In the second scheme, the number of employed servers is increased to n, therefore, it is infeasible for an attacker to forge a valid signature if she canpsilat corrupt all servers and the signer. The both schemes maintain the forward secure property. Finally, we prove the proposed schemes are correct and forward secure.
本文采用Bellare-Miner方案,提出了两种服务器辅助前向安全签名方案。在第一种方案中,用户(签名者)可以使用服务器来帮助她生成签名。在第二种方案中,使用的服务器数量增加到n,因此,如果攻击者能够破坏所有服务器和签名者,则无法伪造有效签名。这两种方案都保持了前向安全特性。最后,我们证明了所提方案的正确性和前向安全性。
{"title":"Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme","authors":"Jia Yu, Fanyu Kong, Rong Hao, Dexiang Zhang","doi":"10.1109/ISECS.2008.44","DOIUrl":"https://doi.org/10.1109/ISECS.2008.44","url":null,"abstract":"In this paper, we propose two server-assisted forward secure signature schemes using Bellare-Miner Scheme. In the first scheme, the user (signer) can employ a server to help her to produce a signature. In the second scheme, the number of employed servers is increased to n, therefore, it is infeasible for an attacker to forge a valid signature if she canpsilat corrupt all servers and the signer. The both schemes maintain the forward secure property. Finally, we prove the proposed schemes are correct and forward secure.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122555933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research and Application on OLAP-based Farm Products Examination Model 基于olap的农产品检测模型研究与应用
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.156
Minghua Han, Chun-hua Ju
The technology of Data Warehouse is being widely used in decision making and data analysis. Data Warehouse generalizes and consolidates multidimensional (MD) data. Hence, Data Warehouse has become an important platform for OLAP which is based on a MD data model. Therefore, dimensional modeling is a key factor in OLAP data analysis. In this paper, we address the technology of dimensional modeling based on Data Warehouse. Based on the technology of dimensional modeling, we integrate the characters of farm product transaction market in China and take the farm product examination as the subject of data analysis. Then the packet graphic and snowflake schema of farm product examination are designed. Finally, the paper offers the results of the OLAP with farm product examination model.
数据仓库技术在决策和数据分析中得到了广泛的应用。数据仓库概括和整合多维(MD)数据。因此,数据仓库已经成为基于MD数据模型的OLAP的重要平台。因此,维度建模是OLAP数据分析中的一个关键因素。本文研究了基于数据仓库的维度建模技术。基于量纲建模技术,结合中国农产品交易市场的特点,以农产品检验为数据分析的主体。然后设计了农产品检测的包图和雪花图。最后,本文给出了基于农产品检验模型的OLAP分析结果。
{"title":"Research and Application on OLAP-based Farm Products Examination Model","authors":"Minghua Han, Chun-hua Ju","doi":"10.1109/ISECS.2008.156","DOIUrl":"https://doi.org/10.1109/ISECS.2008.156","url":null,"abstract":"The technology of Data Warehouse is being widely used in decision making and data analysis. Data Warehouse generalizes and consolidates multidimensional (MD) data. Hence, Data Warehouse has become an important platform for OLAP which is based on a MD data model. Therefore, dimensional modeling is a key factor in OLAP data analysis. In this paper, we address the technology of dimensional modeling based on Data Warehouse. Based on the technology of dimensional modeling, we integrate the characters of farm product transaction market in China and take the farm product examination as the subject of data analysis. Then the packet graphic and snowflake schema of farm product examination are designed. Finally, the paper offers the results of the OLAP with farm product examination model.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117293272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Information Assurance Framework on Trusted Autonomic Communications 可信自主通信的信息保障框架
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.217
R. Ng, Linying Dong
Increasing incidents of security breaches and identity thefts have pressured organizations to make information security a priority in order to restore consumerspsila trust. As shown in the four case studies reported in this paper, ensuring information security goes beyond advanced technological solutions as it involves a complex interaction process between human actors and these technological solutions. Therefore, we propose an Information Assurance framework to address the complexity of information security, and illustrate the usefulness of our framework by applying it to the four cases. We conclude the study with a discussion and directions for future research.
越来越多的安全漏洞和身份盗窃事件迫使组织将信息安全作为优先事项,以恢复消费者的信任。正如本文报告的四个案例研究所示,确保信息安全超越了先进的技术解决方案,因为它涉及人类参与者与这些技术解决方案之间的复杂交互过程。因此,我们提出了一个信息保障框架来解决信息安全的复杂性,并通过将我们的框架应用于四个案例来说明它的有用性。最后对研究进行了总结,并提出了今后的研究方向。
{"title":"An Information Assurance Framework on Trusted Autonomic Communications","authors":"R. Ng, Linying Dong","doi":"10.1109/ISECS.2008.217","DOIUrl":"https://doi.org/10.1109/ISECS.2008.217","url":null,"abstract":"Increasing incidents of security breaches and identity thefts have pressured organizations to make information security a priority in order to restore consumerspsila trust. As shown in the four case studies reported in this paper, ensuring information security goes beyond advanced technological solutions as it involves a complex interaction process between human actors and these technological solutions. Therefore, we propose an Information Assurance framework to address the complexity of information security, and illustrate the usefulness of our framework by applying it to the four cases. We conclude the study with a discussion and directions for future research.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129942375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enforcing Information Flow Constraints in RBAC Environments 在RBAC环境中实施信息流约束
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.57
Wei Zhou, C. Meinel
While role-based access control (RBAC) as an alternative to traditional discretionary and mandatory access controls is very effective and popular, subsequent attempts to apply it in various application environments also revealed some limitations of RBAC. We developed a new type of security policy, called label-based access control policy (LBACP) that can be used for enhancing RBAC. Unlike other access control policies, LBACP is not used independently. On the contrary, it should be combined with other access control policies. The basic principle is defining some labels that specify information flow constraints, and then assigning these labels to other access control policies or their components. The usage of the labeled policy components must conform to the information flow constraints defined by the labels in order to avoid being misused. Thus, some potential information leaks can be avoided. This paper investigates how the LBACP can be used to enhance RBAC.
尽管基于角色的访问控制(RBAC)作为传统的自主和强制访问控制的替代方案非常有效和流行,但随后在各种应用程序环境中应用它的尝试也暴露了RBAC的一些局限性。我们开发了一种新的安全策略,称为基于标签的访问控制策略(LBACP),可用于增强RBAC。与其他访问控制策略不同,LBACP不是单独使用的。相反,它应该与其他访问控制策略结合使用。基本原理是定义一些指定信息流约束的标签,然后将这些标签分配给其他访问控制策略或其组件。带标签的策略组件的使用必须符合由标签定义的信息流约束,以避免被滥用。因此,可以避免一些潜在的信息泄漏。本文探讨了如何利用LBACP来增强RBAC。
{"title":"Enforcing Information Flow Constraints in RBAC Environments","authors":"Wei Zhou, C. Meinel","doi":"10.1109/ISECS.2008.57","DOIUrl":"https://doi.org/10.1109/ISECS.2008.57","url":null,"abstract":"While role-based access control (RBAC) as an alternative to traditional discretionary and mandatory access controls is very effective and popular, subsequent attempts to apply it in various application environments also revealed some limitations of RBAC. We developed a new type of security policy, called label-based access control policy (LBACP) that can be used for enhancing RBAC. Unlike other access control policies, LBACP is not used independently. On the contrary, it should be combined with other access control policies. The basic principle is defining some labels that specify information flow constraints, and then assigning these labels to other access control policies or their components. The usage of the labeled policy components must conform to the information flow constraints defined by the labels in order to avoid being misused. Thus, some potential information leaks can be avoided. This paper investigates how the LBACP can be used to enhance RBAC.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129477928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information Security Game Analysis with Penalty Parameter 具有惩罚参数的信息安全博弈分析
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.149
Wei Sun, Xiangwei Kong, Dequan He, Xingang You
This paper analyzes information security in the E-commerce based on game theory, and this game analysis method is applied to information security for the first time. We set up the information security game model of the defender and the attacker, make the equilibrium analysis of this game model, and get the ideal strategy combination. Then we introduce the penalty parameter of the defender and the penalty parameter of the attacker to solve the problem that the restriction condition is not satisfied. The introduction of the penalty parameter of the defender promotes the defender to invest in information security, and the introduction of the penalty parameter of the attacker promotes the attacker to take no attack strategy. This paper provides good reference for information security in the E-commerce.
本文基于博弈论对电子商务中的信息安全进行了分析,并首次将这种博弈论分析方法应用于信息安全领域。建立了防御方和攻击方的信息安全博弈模型,并对该博弈模型进行了均衡分析,得到了理想的策略组合。然后引入防御方的惩罚参数和攻击方的惩罚参数,解决了约束条件不满足的问题。防御方惩罚参数的引入促进了防御方对信息安全的投资,而攻击方惩罚参数的引入促进了攻击方不采取攻击策略。本文为电子商务中的信息安全提供了很好的参考。
{"title":"Information Security Game Analysis with Penalty Parameter","authors":"Wei Sun, Xiangwei Kong, Dequan He, Xingang You","doi":"10.1109/ISECS.2008.149","DOIUrl":"https://doi.org/10.1109/ISECS.2008.149","url":null,"abstract":"This paper analyzes information security in the E-commerce based on game theory, and this game analysis method is applied to information security for the first time. We set up the information security game model of the defender and the attacker, make the equilibrium analysis of this game model, and get the ideal strategy combination. Then we introduce the penalty parameter of the defender and the penalty parameter of the attacker to solve the problem that the restriction condition is not satisfied. The introduction of the penalty parameter of the defender promotes the defender to invest in information security, and the introduction of the penalty parameter of the attacker promotes the attacker to take no attack strategy. This paper provides good reference for information security in the E-commerce.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123918922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Numeric Watermark Method Based on Valve-Value Surface 一种基于阀值曲面的数字水印方法
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.94
Hu Zhihua, Niu Jiping
This paper proposes a digital watermarking method based on valve-value surface. First it builds the valve value of curve surface of the original image to get the outline information of the original image; then it embeds watermarks into the edge of the outline. Because the function used by the method to build valve-value surface has high gliding property and easy interpolation ability, the method has strong resistance to attacks like filtering and zooming. The experimental outcome shows that the method has the above advantages.
提出了一种基于阀值曲面的数字水印方法。首先建立原始图像曲面的阀值,得到原始图像的轮廓信息;然后将水印嵌入到轮廓的边缘。由于该方法构建阀值曲面所使用的函数具有较高的滑动性和易于插值的能力,因此该方法具有较强的抗滤波和缩放攻击能力。实验结果表明,该方法具有以上优点。
{"title":"A Numeric Watermark Method Based on Valve-Value Surface","authors":"Hu Zhihua, Niu Jiping","doi":"10.1109/ISECS.2008.94","DOIUrl":"https://doi.org/10.1109/ISECS.2008.94","url":null,"abstract":"This paper proposes a digital watermarking method based on valve-value surface. First it builds the valve value of curve surface of the original image to get the outline information of the original image; then it embeds watermarks into the edge of the outline. Because the function used by the method to build valve-value surface has high gliding property and easy interpolation ability, the method has strong resistance to attacks like filtering and zooming. The experimental outcome shows that the method has the above advantages.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116215577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images 基于(7,4)汉明码的数字图像高有效载荷隐写方案
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.222
Chinchen Chang, T. Kieu, Yung-Chen Chou
High payload information hiding schemes with the good visual quality of stego images are suitable for steganographic applications such as online content distribution systems. This paper proposes a novel steganographic scheme based on the (7, 4) Hamming code for digital images.The proposed scheme embeds a segment of seven secret bits into a group of seven cover pixels at a time. The experimental results show that the proposed scheme achieves a double embedding payload and a slightly lower visual quality of stego images compared with the related works.
高有效载荷信息隐藏方案具有良好的隐写图像视觉质量,适用于在线内容分发系统等隐写应用。提出了一种基于(7,4)汉明码的数字图像隐写方案。该方案每次将7个秘密比特嵌入到7个覆盖像素组中。实验结果表明,该方法实现了双嵌入载荷,隐写图像的视觉质量略低于相关方法。
{"title":"A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images","authors":"Chinchen Chang, T. Kieu, Yung-Chen Chou","doi":"10.1109/ISECS.2008.222","DOIUrl":"https://doi.org/10.1109/ISECS.2008.222","url":null,"abstract":"High payload information hiding schemes with the good visual quality of stego images are suitable for steganographic applications such as online content distribution systems. This paper proposes a novel steganographic scheme based on the (7, 4) Hamming code for digital images.The proposed scheme embeds a segment of seven secret bits into a group of seven cover pixels at a time. The experimental results show that the proposed scheme achieves a double embedding payload and a slightly lower visual quality of stego images compared with the related works.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121676660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
Research on an Advanced Novel Watermarking Technology with Higher Robustness 一种新型高鲁棒性高级水印技术研究
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.143
Gengming Zhu
Image watermarking has played an important role to protect and authenticate the intellectual property. One new advanced watermarking technology is presented in the paper. It incorporates two watermarks in an image to improve the protection and robustness. Before embedded in the host image, a watermark, in form of a PN sequence, is embedded in the wavelet domain of a primary watermark. It is tested by using Lena image as a host and by using the camera man as the primary watermark. The PN sequence is detectable by correlation among other five sequences, and a SNR of 44 dB was obtained. On the other hand, four types of noises are added to the watermarked image, namely luminance change, low pass filtering, compression, and salt and pepper noise. The robustness of the technology is tested by this method. In all above cases the watermark is easy to detect.
图像水印在保护和鉴定知识产权方面发挥了重要作用。本文提出了一种新的高级水印技术。它在一幅图像中加入两个水印,以提高保护和鲁棒性。在嵌入到主图像之前,水印以PN序列的形式嵌入到主水印的小波域中。采用Lena图像作为主机,摄像人作为主水印,对该算法进行了验证。PN序列可通过其他5个序列的相关性检测,信噪比为44 dB。另一方面,在水印图像中加入亮度变化、低通滤波、压缩和椒盐噪声等四种噪声。通过该方法验证了该技术的鲁棒性。在上述所有情况下,水印都很容易检测到。
{"title":"Research on an Advanced Novel Watermarking Technology with Higher Robustness","authors":"Gengming Zhu","doi":"10.1109/ISECS.2008.143","DOIUrl":"https://doi.org/10.1109/ISECS.2008.143","url":null,"abstract":"Image watermarking has played an important role to protect and authenticate the intellectual property. One new advanced watermarking technology is presented in the paper. It incorporates two watermarks in an image to improve the protection and robustness. Before embedded in the host image, a watermark, in form of a PN sequence, is embedded in the wavelet domain of a primary watermark. It is tested by using Lena image as a host and by using the camera man as the primary watermark. The PN sequence is detectable by correlation among other five sequences, and a SNR of 44 dB was obtained. On the other hand, four types of noises are added to the watermarked image, namely luminance change, low pass filtering, compression, and salt and pepper noise. The robustness of the technology is tested by this method. In all above cases the watermark is easy to detect.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124388428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Mechanism Design of Third Party Assure-Payment Platform 第三方担保支付平台机制设计
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.18
Yong Xu
This paper puts forward a new thought of application about the third party assure-payment platform in BtoB mode. The third payment platform has often been applied to BtoC and CtoC, as the guarantee of exchange and payment agency, but now the third payment platform has not play a security role fundamentally. The application about the third payment platform in BtoB has some obstacles. This paper discusses the improvement of guarantee mechanism of the third party payment platform, the operating mode and payment process, analyzes its value chain and charge mode.
本文提出了第三方担保支付平台在b2c模式下应用的新思路。第三支付平台经常被应用于BtoC和CtoC,作为交易担保和支付机构,但现在第三支付平台并没有从根本上发挥安全作用。关于第三方支付平台在BtoB中的应用存在一些障碍。本文探讨了第三方支付平台保障机制的完善、运营模式和支付流程,分析了第三方支付平台的价值链和收费模式。
{"title":"The Mechanism Design of Third Party Assure-Payment Platform","authors":"Yong Xu","doi":"10.1109/ISECS.2008.18","DOIUrl":"https://doi.org/10.1109/ISECS.2008.18","url":null,"abstract":"This paper puts forward a new thought of application about the third party assure-payment platform in BtoB mode. The third payment platform has often been applied to BtoC and CtoC, as the guarantee of exchange and payment agency, but now the third payment platform has not play a security role fundamentally. The application about the third payment platform in BtoB has some obstacles. This paper discusses the improvement of guarantee mechanism of the third party payment platform, the operating mode and payment process, analyzes its value chain and charge mode.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126202507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption 将藤崎-冈本转换应用于基于证书的加密
Pub Date : 2008-08-03 DOI: 10.1109/ISECS.2008.61
Yang Lu, Jiguo Li, Junmo Xiao
The Fujisaki-Okamoto (FO) conversion is a generic conversion to enhance a public key encryption scheme with security of one-way against chosen plaintext attacks (OW-CPA) to security of indistinguishable against adaptive chosen ciphertext attacks (IND-CCA) in the random oracle model. Existing works have shown that the FO conversion also can generically upgrade the security of the identity-based encryption (IBE) schemes or certificateless public key encryption (CL-PKE) schemes. However, it is still unknown if the same holds for certificate-based encryption (CBE) schemes. In this paper, we investigate the generic security of the CBE scheme obtained by applying the FO conversion to an arbitrary underlying OW-CBE-CPA secure CBE scheme and confirm that the FO conversion can generically convert any OW-CBE-CPA secure CBE into an IND-CBE-CCA secure CBE. We also note that the straightforward application of the FO conversion only leads to a CBE scheme with a loose reduction. To solve this problem, we propose an enhanced FO conversion which just introduces minor extra computation overhead, but results in considerably more efficient security reduction.
Fujisaki-Okamoto (FO)转换是一种将公钥加密方案从抗选择明文攻击(low - cpa)的单向安全性提高到抗自适应选择密文攻击(IND-CCA)的不可区分安全性的通用转换。已有研究表明,FO转换还可以普遍提高基于身份的加密(IBE)方案或无证书公钥加密(CL-PKE)方案的安全性。然而,对于基于证书的加密(CBE)方案是否也存在同样的问题,我们仍然不得而知。本文研究了将FO转换应用于任意底层low -CBE- cpa安全CBE方案所获得的CBE方案的一般安全性,并证实了FO转换可以将任意底层low -CBE- cpa安全CBE转换为IND-CBE-CCA安全CBE。我们还注意到,直接应用FO转换只会导致具有松散缩减的CBE方案。为了解决这个问题,我们提出了一种增强的FO转换,它只引入了少量额外的计算开销,但结果是更有效地降低了安全性。
{"title":"Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption","authors":"Yang Lu, Jiguo Li, Junmo Xiao","doi":"10.1109/ISECS.2008.61","DOIUrl":"https://doi.org/10.1109/ISECS.2008.61","url":null,"abstract":"The Fujisaki-Okamoto (FO) conversion is a generic conversion to enhance a public key encryption scheme with security of one-way against chosen plaintext attacks (OW-CPA) to security of indistinguishable against adaptive chosen ciphertext attacks (IND-CCA) in the random oracle model. Existing works have shown that the FO conversion also can generically upgrade the security of the identity-based encryption (IBE) schemes or certificateless public key encryption (CL-PKE) schemes. However, it is still unknown if the same holds for certificate-based encryption (CBE) schemes. In this paper, we investigate the generic security of the CBE scheme obtained by applying the FO conversion to an arbitrary underlying OW-CBE-CPA secure CBE scheme and confirm that the FO conversion can generically convert any OW-CBE-CPA secure CBE into an IND-CBE-CCA secure CBE. We also note that the straightforward application of the FO conversion only leads to a CBE scheme with a loose reduction. To solve this problem, we propose an enhanced FO conversion which just introduces minor extra computation overhead, but results in considerably more efficient security reduction.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122242692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2008 International Symposium on Electronic Commerce and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1