首页 > 最新文献

2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)最新文献

英文 中文
Scan based side channel attack on Grain v1 基于扫描的侧信道攻击谷物v1
Sonu Jha
In this paper we study a scan based side channel attack against the Grain family of stream ciphers. The attack works because scan chain test of circuits can be transformed into a powerful cryptographic attack due to the properties of scan based technique. So as a result the attack targets the test circuitry. We show how the attacker gains the knowledge about the locations of internal state bits of the NFSR and the LFSR and how he finds the secret key.
本文研究了一种基于扫描的针对Grain系列流密码的侧信道攻击方法。由于基于扫描技术的特性,电路的扫描链测试可以转化为强大的密码攻击。因此,攻击的目标是测试电路。我们展示了攻击者如何获得关于NFSR和LFSR内部状态位的位置的知识,以及他如何找到密钥。
{"title":"Scan based side channel attack on Grain v1","authors":"Sonu Jha","doi":"10.1109/ISCISC.2013.6767320","DOIUrl":"https://doi.org/10.1109/ISCISC.2013.6767320","url":null,"abstract":"In this paper we study a scan based side channel attack against the Grain family of stream ciphers. The attack works because scan chain test of circuits can be transformed into a powerful cryptographic attack due to the properties of scan based technique. So as a result the attack targets the test circuitry. We show how the attacker gains the knowledge about the locations of internal state bits of the NFSR and the LFSR and how he finds the secret key.","PeriodicalId":265985,"journal":{"name":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132774372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chaos-based selective key (CSK) Cryptosystem: A new direction to secure VPN 基于混沌的选择密钥(CSK)密码系统:安全VPN的新方向
Vahid Khodabakhshi, Mahdi Soltani, R. Jalili, Mostafa Rezvani
VPNs todays are expected to be more secure and support higher throughput for their new applications, such as Inter-Cloud VPN and Virtual Private Cloud. Blockcipher is an important security component employed in most VPNs. On the other hand, most blockciphers have mathematical weaknesses in their structures, so the attacker can use these weaknesses to break them faster than brute-force attacks. This paper proposes a new method for increasing the security of blockciphers in a much more efficient method than the cascading encryption which is another manner of having a more secure blockcipher. Our method overcomes the weaknesses of blockcipher algorithms against the cryptanalysis which uses some ciphertext/plaintext pairs to obtain the key. The method makes it hard to collect the needed pairs. Our focus in this paper is using of the proposed method in building VPNs which provide higher security and acceptable throughput. Additionally, such VPNs do not need synchronization when the underlying transport protocol is unreliable. Our analytical and practical evaluations demonstrate the satisfaction of the claims.
如今,人们期望VPN更加安全,并为其新应用(如跨云VPN和虚拟私有云)提供更高的吞吐量。块密码是大多数vpn中使用的重要安全组件。另一方面,大多数区块密码在其结构中存在数学弱点,因此攻击者可以利用这些弱点比暴力攻击更快地破解它们。本文提出了一种比级联加密更有效地提高块密码安全性的新方法,级联加密是另一种具有更安全块密码的方式。该方法克服了块密码算法在密码分析中使用一些密文/明文对获取密钥的缺点。这种方法很难收集到所需的配对。本文的重点是利用所提出的方法构建具有更高安全性和可接受吞吐量的vpn。此外,当底层传输协议不可靠时,这种vpn不需要同步。我们的分析和实际评估表明索赔是令人满意的。
{"title":"Chaos-based selective key (CSK) Cryptosystem: A new direction to secure VPN","authors":"Vahid Khodabakhshi, Mahdi Soltani, R. Jalili, Mostafa Rezvani","doi":"10.1109/ISCISC.2013.6767355","DOIUrl":"https://doi.org/10.1109/ISCISC.2013.6767355","url":null,"abstract":"VPNs todays are expected to be more secure and support higher throughput for their new applications, such as Inter-Cloud VPN and Virtual Private Cloud. Blockcipher is an important security component employed in most VPNs. On the other hand, most blockciphers have mathematical weaknesses in their structures, so the attacker can use these weaknesses to break them faster than brute-force attacks. This paper proposes a new method for increasing the security of blockciphers in a much more efficient method than the cascading encryption which is another manner of having a more secure blockcipher. Our method overcomes the weaknesses of blockcipher algorithms against the cryptanalysis which uses some ciphertext/plaintext pairs to obtain the key. The method makes it hard to collect the needed pairs. Our focus in this paper is using of the proposed method in building VPNs which provide higher security and acceptable throughput. Additionally, such VPNs do not need synchronization when the underlying transport protocol is unreliable. Our analytical and practical evaluations demonstrate the satisfaction of the claims.","PeriodicalId":265985,"journal":{"name":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133150792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An analysis on interactions among secondary user and unknown jammer in cognitive radio systems by fictitious play 基于虚拟游戏的认知无线电系统中二次用户与未知干扰者交互分析
E. Meamari, Khadijeh Afhamisisi, H. Shahhoseini
With the advancement of communication, the spectrum shortage problem becomes a serious problem for future generations. The cognitive radio technology is proposed for this problem. In cognitive radio networks, the secondary users can access spectrum that allocated to the primary users without interference to the operation of primary users. There are a lot of attacks for this technology that one of them is jamming attacks. The best strategy for countering the jamming attack is to switch other bands. This attack is very hard to detect when the malicious user is unknown and there are no information about the payoffs of attacker. In this paper, we propose to use fictitious game for analysis the defense against this unknown jamming attacker.
随着通信技术的发展,频谱短缺问题已成为困扰下一代的一个严重问题。针对这一问题,提出了认知无线电技术。在认知无线网络中,辅助用户可以在不干扰主用户操作的情况下接入分配给主用户的频谱。针对这项技术的攻击有很多,其中之一就是干扰攻击。对付干扰攻击的最佳策略是切换其他频段。当恶意用户是未知的,并且没有关于攻击者收益的信息时,这种攻击很难检测到。在本文中,我们提出使用虚拟游戏来分析对这种未知干扰攻击者的防御。
{"title":"An analysis on interactions among secondary user and unknown jammer in cognitive radio systems by fictitious play","authors":"E. Meamari, Khadijeh Afhamisisi, H. Shahhoseini","doi":"10.1109/ISCISC.2013.6767327","DOIUrl":"https://doi.org/10.1109/ISCISC.2013.6767327","url":null,"abstract":"With the advancement of communication, the spectrum shortage problem becomes a serious problem for future generations. The cognitive radio technology is proposed for this problem. In cognitive radio networks, the secondary users can access spectrum that allocated to the primary users without interference to the operation of primary users. There are a lot of attacks for this technology that one of them is jamming attacks. The best strategy for countering the jamming attack is to switch other bands. This attack is very hard to detect when the malicious user is unknown and there are no information about the payoffs of attacker. In this paper, we propose to use fictitious game for analysis the defense against this unknown jamming attacker.","PeriodicalId":265985,"journal":{"name":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125786875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Universal image steganalysis using singular values of DCT coefficients 使用DCT系数奇异值的通用图像隐写分析
M. Heidari, Shahrokh Gaemmaghami
We propose a blind image steganalysis method based on the Singular Value Decomposition (SVD) of the Discrete Cosine Transform (DCT) coefficients that are revisited in this work. We compute geometric mean, mean of log values, and statistical moments (mean, variance and skewness) of the SVDs of the DCT sub-blocks that are averaged over the whole image to construct a 480-element feature vector for steganalysis. These features are fed to a Support Vector Machine (SVM) classifier to discriminate between stego and cover images. Experimental results show that the proposed method outperforms most powerful steganalyzers when applied to some well-known steganography algorithms.
我们提出了一种基于离散余弦变换(DCT)系数的奇异值分解(SVD)的盲图像隐写分析方法。我们计算在整个图像上平均的DCT子块的svd的几何平均值,对数值的平均值和统计矩(平均值,方差和偏度),以构建用于隐写分析的480元素特征向量。这些特征被馈送到支持向量机(SVM)分类器来区分隐写图像和覆盖图像。实验结果表明,该方法在应用于一些知名隐写算法时,优于最强大的隐写分析器。
{"title":"Universal image steganalysis using singular values of DCT coefficients","authors":"M. Heidari, Shahrokh Gaemmaghami","doi":"10.1109/ISCISC.2013.6767340","DOIUrl":"https://doi.org/10.1109/ISCISC.2013.6767340","url":null,"abstract":"We propose a blind image steganalysis method based on the Singular Value Decomposition (SVD) of the Discrete Cosine Transform (DCT) coefficients that are revisited in this work. We compute geometric mean, mean of log values, and statistical moments (mean, variance and skewness) of the SVDs of the DCT sub-blocks that are averaged over the whole image to construct a 480-element feature vector for steganalysis. These features are fed to a Support Vector Machine (SVM) classifier to discriminate between stego and cover images. Experimental results show that the proposed method outperforms most powerful steganalyzers when applied to some well-known steganography algorithms.","PeriodicalId":265985,"journal":{"name":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129101035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Quantitative verification of beta reputation system using PRISM probabilistic model checker 使用PRISM概率模型检查器对beta信誉系统进行定量验证
Amir Jalaly Bidgoly, B. T. Ladani
Reputation systems are responsible for computing the reputation rank of entities in a community or network based on collecting the opinions. Reputation systems have gained lots of interests in different environments such as P2P networks and e-market-places. Despite the popularity of reputation systems, they are vulnerable to different kinds of attacks which can simply lead the system to erroneous results. In this paper we propose a novel approach for quantitative verification of reputation models using Prism probabilistic model checker. We have applied the proposed method to Beta reputation system as a famous and widely used reputation model that is the base of many other recent reputation models. The proposed method is capable of verifying the reputation model for finding the worst possible attack scenario. Also it can be used to find a series of pre-defined attacks. To illustrate the proposed method, three case studies are also presented.
信誉系统负责在收集意见的基础上计算社区或网络中实体的信誉等级。信誉系统在P2P网络和电子市场等不同的环境中获得了广泛的关注。尽管声誉系统很受欢迎,但它们很容易受到不同类型的攻击,这些攻击可能会导致系统产生错误的结果。本文提出了一种利用Prism概率模型检查器对信誉模型进行定量验证的新方法。我们已经将提出的方法应用于Beta声誉系统,作为一个著名的和广泛使用的声誉模型,它是许多其他最近的声誉模型的基础。该方法能够验证信誉模型以发现最坏的可能攻击场景。它还可以用来查找一系列预定义的攻击。为了说明所提出的方法,还提出了三个案例研究。
{"title":"Quantitative verification of beta reputation system using PRISM probabilistic model checker","authors":"Amir Jalaly Bidgoly, B. T. Ladani","doi":"10.1109/ISCISC.2013.6767336","DOIUrl":"https://doi.org/10.1109/ISCISC.2013.6767336","url":null,"abstract":"Reputation systems are responsible for computing the reputation rank of entities in a community or network based on collecting the opinions. Reputation systems have gained lots of interests in different environments such as P2P networks and e-market-places. Despite the popularity of reputation systems, they are vulnerable to different kinds of attacks which can simply lead the system to erroneous results. In this paper we propose a novel approach for quantitative verification of reputation models using Prism probabilistic model checker. We have applied the proposed method to Beta reputation system as a famous and widely used reputation model that is the base of many other recent reputation models. The proposed method is capable of verifying the reputation model for finding the worst possible attack scenario. Also it can be used to find a series of pre-defined attacks. To illustrate the proposed method, three case studies are also presented.","PeriodicalId":265985,"journal":{"name":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120952074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A novel and low-energy PKC-based key agreement protocol for WSNs 基于pkc的新型低能耗无线传感器网络密钥协议
Hamzeh Ghasemzadeh, M. Aref, A. Payandeh
Security is a critical and vital task in WSNs. Recently, key management as the core of a secure communication has received lots of attention, but in most of the proposed methods security has been compromised in favor of reducing energy consumption. Consequently, perfect resiliency has not been achieved by most of the previous works. Hostile environment, ability of adversary to capture the nodes, and dead nodes with sensitive data scattered in the region, calls for a more secure and yet practical method. This paper proposes a novel authentication scheme based on broadcast messages from BS to improve security of key management system. Through simulation it is shown that energy consumption of the proposed method, as the most valuable resource in a WSN, is the least among the other existing practical PKC-based key managements. Furthermore, it is shown besides supporting the largest network, the proposed method is very flexible and can provide many different tradeoffs to support wide range of applications. Another problem with WSN network is dead nodes and the cryptographic data stored in them. In the proposed method, it is argued that these data have lost their validity, and therefore are of no value for the adversary.
在无线传感器网络中,安全是一项至关重要的任务。近年来,密钥管理作为安全通信的核心受到了广泛的关注,但在大多数提出的方法中,为了降低能耗而牺牲了安全性。因此,以往的大多数作品都没有达到完美的弹性。敌对的环境、对手捕获节点的能力以及散布在该区域的敏感数据的死节点,需要一种更安全、更实用的方法。为了提高密钥管理系统的安全性,本文提出了一种新的基于BS广播消息的认证方案。仿真结果表明,在现有的基于pkc的密钥管理方法中,该方法的能耗是最小的,是WSN中最宝贵的资源。此外,除了支持最大的网络外,所提出的方法非常灵活,可以提供许多不同的权衡,以支持广泛的应用。无线传感器网络的另一个问题是死节点和存储在其中的加密数据。在提出的方法中,认为这些数据已经失去了有效性,因此对对手没有价值。
{"title":"A novel and low-energy PKC-based key agreement protocol for WSNs","authors":"Hamzeh Ghasemzadeh, M. Aref, A. Payandeh","doi":"10.1109/ISCISC.2013.6767321","DOIUrl":"https://doi.org/10.1109/ISCISC.2013.6767321","url":null,"abstract":"Security is a critical and vital task in WSNs. Recently, key management as the core of a secure communication has received lots of attention, but in most of the proposed methods security has been compromised in favor of reducing energy consumption. Consequently, perfect resiliency has not been achieved by most of the previous works. Hostile environment, ability of adversary to capture the nodes, and dead nodes with sensitive data scattered in the region, calls for a more secure and yet practical method. This paper proposes a novel authentication scheme based on broadcast messages from BS to improve security of key management system. Through simulation it is shown that energy consumption of the proposed method, as the most valuable resource in a WSN, is the least among the other existing practical PKC-based key managements. Furthermore, it is shown besides supporting the largest network, the proposed method is very flexible and can provide many different tradeoffs to support wide range of applications. Another problem with WSN network is dead nodes and the cryptographic data stored in them. In the proposed method, it is argued that these data have lost their validity, and therefore are of no value for the adversary.","PeriodicalId":265985,"journal":{"name":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122849440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Computing elliptic curve discrete logarithm via lifting 通过提升计算椭圆曲线离散对数
H. Daghigh, S. Didari, F. S. Shahpar
Index calculus is the best known method for solving discrete logarithm problem(DLP) in general groups. In the elliptic curve case this method uses lifting and dependence relation among lifted rational points to solve DLP. In this paper, we propose an algorithm to find such dependence relation in rank one case.
指数演算是求解一般群离散对数问题的最著名的方法。在椭圆曲线情况下,该方法利用提升和提升有理点之间的依赖关系来求解DLP。在本文中,我们提出了一种在秩一情况下寻找这种依赖关系的算法。
{"title":"Computing elliptic curve discrete logarithm via lifting","authors":"H. Daghigh, S. Didari, F. S. Shahpar","doi":"10.1109/ISCISC.2013.6767331","DOIUrl":"https://doi.org/10.1109/ISCISC.2013.6767331","url":null,"abstract":"Index calculus is the best known method for solving discrete logarithm problem(DLP) in general groups. In the elliptic curve case this method uses lifting and dependence relation among lifted rational points to solve DLP. In this paper, we propose an algorithm to find such dependence relation in rank one case.","PeriodicalId":265985,"journal":{"name":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115570687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An unsupervised anomaly detection engine with an efficient feature set for AODV 基于高效特征集的无监督异常检测引擎
Mohammad K. Houri Zarch, Masih Abedini, M. Berenjkoub, Amin Mirhosseini
There are some security issues in Mobile Ad hoc Networks (MANETs) due to mobility, dynamic topology changes, and lack of any infrastructure. In MANETs, it is of great importance to detect anomaly and malicious behavior. In order to detect malicious attacks via intrusion detection systems and analyze the data set, we need to select some features. Hence, feature selection plays critical role in detecting various attacks. In the literature, there are several proposals to select such features. Usually, Principal Component Analysis (PCA) analyzes the data set and the selected features. In this paper, we have collected a feature set from some state-of-the-art works in the literature. Actually, our simulation shows this feature set detect anomaly behavior more accurate. In addition, for the first time, we use robust PCA for analyzing the data set instead of PCA in MANET. By means of robust PCA, we have an unsupervised algorithm versus semi-supervised provided by PCA. In contrast to PCA, our results show robust PCA cannot be affected by outlier data within the network. In this paper, normal and attack states are simulated and the results are analyzed.
由于移动性、动态拓扑变化和缺乏任何基础设施,移动自组织网络(manet)存在一些安全问题。在manet中,检测异常和恶意行为非常重要。为了通过入侵检测系统检测出恶意攻击并对数据集进行分析,我们需要选择一些特征。因此,特征选择在检测各种攻击中起着至关重要的作用。在文献中,有几种选择这些特征的建议。通常,主成分分析(PCA)分析数据集和选定的特征。在本文中,我们收集了一些文献中最先进的作品的特征集。仿真结果表明,该特征集对异常行为的检测更为准确。此外,我们首次使用鲁棒PCA来分析数据集,而不是在MANET中使用PCA。通过鲁棒PCA,我们得到了一种无监督算法与PCA提供的半监督算法。与PCA相比,我们的结果表明鲁棒PCA不受网络中离群数据的影响。本文对正常状态和攻击状态进行了仿真,并对仿真结果进行了分析。
{"title":"An unsupervised anomaly detection engine with an efficient feature set for AODV","authors":"Mohammad K. Houri Zarch, Masih Abedini, M. Berenjkoub, Amin Mirhosseini","doi":"10.1109/ISCISC.2013.6767334","DOIUrl":"https://doi.org/10.1109/ISCISC.2013.6767334","url":null,"abstract":"There are some security issues in Mobile Ad hoc Networks (MANETs) due to mobility, dynamic topology changes, and lack of any infrastructure. In MANETs, it is of great importance to detect anomaly and malicious behavior. In order to detect malicious attacks via intrusion detection systems and analyze the data set, we need to select some features. Hence, feature selection plays critical role in detecting various attacks. In the literature, there are several proposals to select such features. Usually, Principal Component Analysis (PCA) analyzes the data set and the selected features. In this paper, we have collected a feature set from some state-of-the-art works in the literature. Actually, our simulation shows this feature set detect anomaly behavior more accurate. In addition, for the first time, we use robust PCA for analyzing the data set instead of PCA in MANET. By means of robust PCA, we have an unsupervised algorithm versus semi-supervised provided by PCA. In contrast to PCA, our results show robust PCA cannot be affected by outlier data within the network. In this paper, normal and attack states are simulated and the results are analyzed.","PeriodicalId":265985,"journal":{"name":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132021443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Attribute-based ring signatures: Security analysis and a new construction 基于属性的环签名:安全性分析与新构造
Rahim Toluee, M. R. Asaar, M. Salmasizadeh
In this study, we review attribute-based ring signature schemes. Our proposal presents two contributions; the first one is security analysis of Wenqiang et al.'s scheme in 2009 by presenting an attack in which we show that their scheme is forgeable. The second contribution is an efficient attribute-based ring signature scheme with constant size and constant number of pairing operations. Our scheme is unconditionally anonymous and unforgeable in the standard model. The security of our proposal is based on Static Diffie Hellman (SDH) problem. Compared with the existing attribute-based ring signature scheme with constant size, the length of the signature and the pairing operations in our scheme are decreased by 1/3 and by 1/4, respectively. Thus, the efficiency of signing and verifying is improved in our proposal.
本文综述了基于属性的环签名方案。我们的建议提出了两个贡献;第一个是2009年Wenqiang等人的方案的安全分析,通过提出一个攻击,我们证明了他们的方案是可伪造的。第二个贡献是一个有效的基于属性的环签名方案,该方案具有恒定大小和恒定数量的配对操作。我们的方案在标准模型中是无条件匿名和不可伪造的。该方案的安全性基于静态Diffie Hellman (SDH)问题。与现有的基于属性的固定大小环签名方案相比,该方案的签名长度和配对操作分别缩短了1/3和1/4。从而提高了签名和验证的效率。
{"title":"Attribute-based ring signatures: Security analysis and a new construction","authors":"Rahim Toluee, M. R. Asaar, M. Salmasizadeh","doi":"10.1109/ISCISC.2013.6767342","DOIUrl":"https://doi.org/10.1109/ISCISC.2013.6767342","url":null,"abstract":"In this study, we review attribute-based ring signature schemes. Our proposal presents two contributions; the first one is security analysis of Wenqiang et al.'s scheme in 2009 by presenting an attack in which we show that their scheme is forgeable. The second contribution is an efficient attribute-based ring signature scheme with constant size and constant number of pairing operations. Our scheme is unconditionally anonymous and unforgeable in the standard model. The security of our proposal is based on Static Diffie Hellman (SDH) problem. Compared with the existing attribute-based ring signature scheme with constant size, the length of the signature and the pairing operations in our scheme are decreased by 1/3 and by 1/4, respectively. Thus, the efficiency of signing and verifying is improved in our proposal.","PeriodicalId":265985,"journal":{"name":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121841985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new trust evaluation method based on reliability of customer feedback for cloud computing 基于客户反馈可靠性的云计算信任评估新方法
Zohre Raghebi, M. Hashemi
One of the most important factors for the adoption and success of cloud computing is trust. Adaptive trust evaluation is a fundamental component for secure computing in the cloud environment. Although several methods have been proposed recently for modeling and evaluating trust in distributed computing environments, there is no general accepted trust evaluation model for cloud computing. In this paper a new trust evaluation method has been proposed. In this scheme, each new customer of a cloud service can determine its trust level using the past experiences of previous customers of this cloud service. The proposed method introduces an adaptive method that helps distinguish between malicious and reliable customer feedbacks. The proposed scheme assigns a reliability weight to each customer feedback. Users who have shared any cloud service before and did rate it similarly are more likely to have the same opinion of a new service. Hence, their evaluation of a new service should be given a higher weight. In cases where no customer has shared a common service with us before, then existing customers who have had a feedback closer to the majority (in any service) may seem to be more reliable and hence their opinion is given a higher weight. The balance between the feedback of customers with shared service and those of majority consensus in the final decision is determined dynamically and based on the rate of malicious attacks. This way the method can respond better to changes in the rate and sources of malicious attacks. The proposed method has been compared with an existing trust evaluation method and proved its superiority in minimizing the effect of malicious feedbacks, and having a faster response time.
采用云计算并取得成功的最重要因素之一是信任。自适应信任评估是云环境下安全计算的基本组成部分。尽管最近提出了几种方法来对分布式计算环境中的信任进行建模和评估,但云计算的信任评估模型尚未得到普遍接受。本文提出了一种新的信任评估方法。在该方案中,云服务的每个新客户可以使用该云服务的前客户的过去经验来确定其信任级别。该方法引入了一种自适应方法,有助于区分恶意和可靠的客户反馈。该方案为每个客户反馈分配一个可靠性权重。那些曾经共享过云服务并且评价相似的用户更有可能对新服务有相同的看法。因此,他们对新服务的评价应该给予更高的权重。如果之前没有客户与我们分享过共同的服务,那么现有客户的反馈更接近大多数(在任何服务中)可能看起来更可靠,因此他们的意见被赋予更高的权重。共享服务的客户反馈与最终决策的多数共识之间的平衡是动态确定的,并基于恶意攻击的速率。这样,该方法可以更好地响应恶意攻击的速率和来源的变化。与现有的信任评估方法进行了比较,证明了该方法具有最小化恶意反馈影响和更快响应时间的优势。
{"title":"A new trust evaluation method based on reliability of customer feedback for cloud computing","authors":"Zohre Raghebi, M. Hashemi","doi":"10.1109/ISCISC.2013.6767353","DOIUrl":"https://doi.org/10.1109/ISCISC.2013.6767353","url":null,"abstract":"One of the most important factors for the adoption and success of cloud computing is trust. Adaptive trust evaluation is a fundamental component for secure computing in the cloud environment. Although several methods have been proposed recently for modeling and evaluating trust in distributed computing environments, there is no general accepted trust evaluation model for cloud computing. In this paper a new trust evaluation method has been proposed. In this scheme, each new customer of a cloud service can determine its trust level using the past experiences of previous customers of this cloud service. The proposed method introduces an adaptive method that helps distinguish between malicious and reliable customer feedbacks. The proposed scheme assigns a reliability weight to each customer feedback. Users who have shared any cloud service before and did rate it similarly are more likely to have the same opinion of a new service. Hence, their evaluation of a new service should be given a higher weight. In cases where no customer has shared a common service with us before, then existing customers who have had a feedback closer to the majority (in any service) may seem to be more reliable and hence their opinion is given a higher weight. The balance between the feedback of customers with shared service and those of majority consensus in the final decision is determined dynamically and based on the rate of malicious attacks. This way the method can respond better to changes in the rate and sources of malicious attacks. The proposed method has been compared with an existing trust evaluation method and proved its superiority in minimizing the effect of malicious feedbacks, and having a faster response time.","PeriodicalId":265985,"journal":{"name":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127562257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1