首页 > 最新文献

Int. J. Appl. Cryptogr.最新文献

英文 中文
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries 匿名RFID身份验证支持针对活动对手的恒定成本密钥查找
Pub Date : 2008-11-01 DOI: 10.1504/IJACT.2008.021082
M. Burmester, B. D. Medeiros, Rossana Motta
In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation between tags and a trusted server. Active adversaries disrupt this synchrony, making a recovery strategy necessary. In some protocols, tags recover by replaying previously used values, thus compromising unlinkability of their transcripts; other schemes require servers to search through the set of issued keys, incurring costs that are not constant with the number of legitimate tags. This article describes an approach based on a lightweight trapdoor one-way function from modular squaring. The solution exploits the fact that synchrony can be recovered even if tags are endowed with only the ability to perform public-key operations, whilst the trusted server is capable of trapdoor computations. The construction is provably secure and generic, transforming any anonymous, challenge-response RFID authentication protocol into another that is robust against active adversaries and supports constant key-lookup cost.
在缺乏充分优化的公钥结构的情况下,射频识别设备(rfid)的匿名身份验证需要标签和可信服务器之间的状态同步。活跃的对手破坏这种同步,使恢复策略成为必要。在一些协议中,标签通过重放以前使用的值来恢复,从而损害其转录本的不可链接性;其他方案要求服务器搜索已发布的密钥集,从而产生与合法标记数量不一致的成本。本文描述了一种基于模块化平方的轻量级活板门单向函数的方法。该解决方案利用了这样一个事实,即即使标记只被赋予执行公钥操作的能力,而受信任的服务器能够进行陷阱门计算,也可以恢复同步。该构造可证明是安全的和通用的,它将任何匿名的挑战响应RFID身份验证协议转换为另一种对主动攻击者具有鲁强性并支持恒定密钥查找成本的协议。
{"title":"Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries","authors":"M. Burmester, B. D. Medeiros, Rossana Motta","doi":"10.1504/IJACT.2008.021082","DOIUrl":"https://doi.org/10.1504/IJACT.2008.021082","url":null,"abstract":"In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation between tags and a trusted server. Active adversaries disrupt this synchrony, making a recovery strategy necessary. In some protocols, tags recover by replaying previously used values, thus compromising unlinkability of their transcripts; other schemes require servers to search through the set of issued keys, incurring costs that are not constant with the number of legitimate tags. This article describes an approach based on a lightweight trapdoor one-way function from modular squaring. The solution exploits the fact that synchrony can be recovered even if tags are endowed with only the ability to perform public-key operations, whilst the trusted server is capable of trapdoor computations. The construction is provably secure and generic, transforming any anonymous, challenge-response RFID authentication protocol into another that is robust against active adversaries and supports constant key-lookup cost.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114530267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Efficient lattice-based signature scheme 高效的基于格的签名方案
Pub Date : 2008-11-01 DOI: 10.1504/IJACT.2008.021085
T. Plantard, W. Susilo, K. Win, Qiong Huang
In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece public key cryptosystem, in which security is related to the hardness of approximating the Closest Vector Problem in a lattice. Furthermore, they also described how to use the same principle of their encryption scheme to provide a signature scheme. Practically, this cryptosystem uses the Euclidean norm, l2-norm, which has been used in many algorithms based on lattice theory. Nonetheless, many drawbacks have been studied and these could lead to cryptanalysis of the scheme. In this article, we present a novel method of reducing a vector under the l∞-norm and propose a digital signature scheme based on it. Our scheme takes advantage of the l∞-norm to increase the resistance of the GGH scheme and to decrease the signature length. Furthermore, after some other improvements, we obtain a very efficient signature scheme, that trades the security level, speed and space.
在Crypto 1997中,Goldreich, Goldwasser和Halevi (GGH)提出了McEliece公钥密码系统的晶格模拟,其中安全性与在晶格中逼近最接近向量问题的硬度有关。此外,他们还描述了如何使用他们的加密方案的相同原理来提供签名方案。实际上,这个密码系统使用了欧几里得范数,12 -范数,它已经在许多基于格理论的算法中使用。尽管如此,已经研究了许多缺点,这些缺点可能导致该方案的密码分析。本文提出了一种新的l∞范数下向量约简方法,并在此基础上提出了一种数字签名方案。我们的方案利用了l∞范数来增加GGH方案的阻力和减小签名长度。此外,经过一些改进,我们得到了一个非常有效的签名方案,交换了安全级别,速度和空间。
{"title":"Efficient lattice-based signature scheme","authors":"T. Plantard, W. Susilo, K. Win, Qiong Huang","doi":"10.1504/IJACT.2008.021085","DOIUrl":"https://doi.org/10.1504/IJACT.2008.021085","url":null,"abstract":"In Crypto 1997, Goldreich, Goldwasser and Halevi (GGH) proposed a lattice analogue of McEliece public key cryptosystem, in which security is related to the hardness of approximating the Closest Vector Problem in a lattice. Furthermore, they also described how to use the same principle of their encryption scheme to provide a signature scheme. Practically, this cryptosystem uses the Euclidean norm, l2-norm, which has been used in many algorithms based on lattice theory. Nonetheless, many drawbacks have been studied and these could lead to cryptanalysis of the scheme. In this article, we present a novel method of reducing a vector under the l∞-norm and propose a digital signature scheme based on it. Our scheme takes advantage of the l∞-norm to increase the resistance of the GGH scheme and to decrease the signature length. Furthermore, after some other improvements, we obtain a very efficient signature scheme, that trades the security level, speed and space.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125774955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparing the pre- and post-specified peer models for key agreement 比较指定前和指定后的密钥协议对等体模型
Pub Date : 2008-07-07 DOI: 10.1504/IJACT.2009.023472
A. Menezes, Berkant Ustaoglu
In the pre-specified peer model for key agreement, it is assumed that a party knows the identifier of its intended communicating peer when it commences a protocol run. On the other hand, a party in the post-specified peer model for key agreement does not know the identifier of its communicating peer at the outset, but learns the identifier during the protocol run. In this paper we compare the security assurances provided by the Canetti-Krawczyk security definitions for key agreement in the pre- and post-specified peer models. We give examples of protocols that are secure in one model but insecure in the other. We also enhance the Canetti-Krawczyk security models and definitions to encompass a class of protocols that are executable and secure in both the pre- and post-specified peer models.
在预先指定的密钥协议对等体模型中,假设一方在开始协议运行时知道其预期通信对等体的标识符。另一方面,密钥协议后指定的对等体模型中的一方在开始时不知道其通信对等体的标识符,但在协议运行期间学习标识符。在本文中,我们比较了Canetti-Krawczyk安全定义在预先指定和后指定的对等体模型中为密钥协议提供的安全保证。我们给出了在一种模型中安全而在另一种模型中不安全的协议示例。我们还增强了Canetti-Krawczyk安全模型和定义,以包含一类在预先和后指定的对等体模型中都是可执行和安全的协议。
{"title":"Comparing the pre- and post-specified peer models for key agreement","authors":"A. Menezes, Berkant Ustaoglu","doi":"10.1504/IJACT.2009.023472","DOIUrl":"https://doi.org/10.1504/IJACT.2009.023472","url":null,"abstract":"In the pre-specified peer model for key agreement, it is assumed that a party knows the identifier of its intended communicating peer when it commences a protocol run. On the other hand, a party in the post-specified peer model for key agreement does not know the identifier of its communicating peer at the outset, but learns the identifier during the protocol run. In this paper we compare the security assurances provided by the Canetti-Krawczyk security definitions for key agreement in the pre- and post-specified peer models. We give examples of protocols that are secure in one model but insecure in the other. We also enhance the Canetti-Krawczyk security models and definitions to encompass a class of protocols that are executable and secure in both the pre- and post-specified peer models.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127855386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
On the relation among various security models for certificateless cryptography 无证书加密中各种安全模型之间的关系
Pub Date : 2008-07-01 DOI: 10.1504/IJACT.2008.021084
Qiong Huang, D. Wong
Certificateless cryptography is a promising technology for solving the key escrow problem in identity-based cryptography. However, the lack of a unified set of definitions and security models currently hinders its progression as much effort has been put on refining the definitions and looking for an appropriate and practical security models. In this article, we aim to contribute on unifying the definitions and security models for Certificateless Encryption (CLE) schemes. First, we show that the original seven-algorithm definition is equivalent to a simplified five-algorithm definition. We believe that this simplified definition may lead to more compact and efficient implementations in practice and also help in the effort of standardisation of CLE. Secondly, we show that a CLE scheme cannot be both malicious Key Generation Center (KGC) secure and strongly secure in the standard model. Due to the practicality and attacking significance of malicious KGC security; and the uncertainty of how practical the strong security is, we, therefore, suggest constructing practical CLE schemes to be malicious KGC secure. Finally, we propose to formalise a new adversarial capability called partial key replacement attack into the security models and show that our generic scheme proposed recently is secure against this new type of attacks.
无证书加密是解决基于身份的加密中密钥托管问题的一种很有前途的技术。然而,缺乏统一的定义和安全模型集目前阻碍了它的发展,因为已经花费了大量的精力来细化定义和寻找合适和实用的安全模型。在本文中,我们致力于统一无证书加密(CLE)方案的定义和安全模型。首先,我们证明了原始的七算法定义等价于简化的五算法定义。我们相信,这种简化的定义可以在实践中使CLE的实现更加紧凑和高效,也有助于CLE的标准化工作。其次,我们证明了CLE方案在标准模型下不可能同时具有恶意密钥生成中心(KGC)安全性和强安全性。由于恶意KGC安全的实用性和攻击意义;以及强安全性的实用性的不确定性,因此,我们建议构建实用的CLE方案来实现恶意KGC安全。最后,我们建议将一种称为部分密钥替换攻击的新对抗能力形式化到安全模型中,并表明我们最近提出的通用方案对这种新型攻击是安全的。
{"title":"On the relation among various security models for certificateless cryptography","authors":"Qiong Huang, D. Wong","doi":"10.1504/IJACT.2008.021084","DOIUrl":"https://doi.org/10.1504/IJACT.2008.021084","url":null,"abstract":"Certificateless cryptography is a promising technology for solving the key escrow problem in identity-based cryptography. However, the lack of a unified set of definitions and security models currently hinders its progression as much effort has been put on refining the definitions and looking for an appropriate and practical security models. In this article, we aim to contribute on unifying the definitions and security models for Certificateless Encryption (CLE) schemes. First, we show that the original seven-algorithm definition is equivalent to a simplified five-algorithm definition. We believe that this simplified definition may lead to more compact and efficient implementations in practice and also help in the effort of standardisation of CLE. Secondly, we show that a CLE scheme cannot be both malicious Key Generation Center (KGC) secure and strongly secure in the standard model. Due to the practicality and attacking significance of malicious KGC security; and the uncertainty of how practical the strong security is, we, therefore, suggest constructing practical CLE schemes to be malicious KGC secure. Finally, we propose to formalise a new adversarial capability called partial key replacement attack into the security models and show that our generic scheme proposed recently is secure against this new type of attacks.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129376202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A tapestry of identity-based encryption: practical frameworks compared 基于身份的加密的挂毯:实用框架的比较
Pub Date : 2008-02-01 DOI: 10.1504/IJACT.2008.017047
Xavier Boyen
This paper surveys the practical benefits and drawbacks of several identity-based encryption schemes based on bilinear pairings. After providing some background on identity-based cryptography, we classify the known constructions into a handful of general approaches. We then describe efficient and fully secure IBE and IBKEM instantiations of each approach, with reducibility to practice as the main design parameter. Finally, we catalogue the strengths and weaknesses of each construction according to a few theoretical and many applied comparison criteria.
本文综述了几种基于双线性对的基于身份的加密方案的实际优缺点。在提供了一些基于身份的密码学的背景知识之后,我们将已知的构造分为几种通用方法。然后,我们描述了每种方法的高效且完全安全的IBE和IBKEM实例,并将可简化性作为主要设计参数。最后,我们根据一些理论和许多应用的比较标准对每种结构的优缺点进行了分类。
{"title":"A tapestry of identity-based encryption: practical frameworks compared","authors":"Xavier Boyen","doi":"10.1504/IJACT.2008.017047","DOIUrl":"https://doi.org/10.1504/IJACT.2008.017047","url":null,"abstract":"This paper surveys the practical benefits and drawbacks of several identity-based encryption schemes based on bilinear pairings. After providing some background on identity-based cryptography, we classify the known constructions into a handful of general approaches. We then describe efficient and fully secure IBE and IBKEM instantiations of each approach, with reducibility to practice as the main design parameter. Finally, we catalogue the strengths and weaknesses of each construction according to a few theoretical and many applied comparison criteria.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"2 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122712092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 92
An optimistic fair exchange protocol and its security in the universal composability framework 通用可组合框架下的乐观公平交换协议及其安全性
Pub Date : 2008-02-01 DOI: 10.1504/IJACT.2008.017052
Yusuke Okada, Yoshifumi Manabe, T. Okamoto
Fair exchange protocols allow both or neither of two parties to obtain the other's items, and this property is essential in e-commerce. In this paper, we construct an optimistic fair exchange protocol that is applicable to any digital signature by prescribing three forms of signatures, namely presignature, post-signature and notarised signature. We set an expiration date for presignature, and thus realise the timely termination of the protocol. Next, we define an ideal functionality of fair exchange protocols in the universal composability framework. Then, we construct an optimistic fair exchange protocol based on the above protocol, and prove its security in the universal composability framework.
公平交换协议允许双方或双方都不能获得对方的物品,这一属性在电子商务中是必不可少的。本文通过规定签名的三种形式,即预签名、后签名和公证签名,构建了一个适用于任何数字签名的乐观公平交换协议。我们设置了预签名的截止日期,从而实现了协议的及时终止。其次,我们在通用可组合性框架中定义了公平交换协议的理想功能。然后,在此基础上构造了一个乐观公平交换协议,并证明了其在通用可组合框架下的安全性。
{"title":"An optimistic fair exchange protocol and its security in the universal composability framework","authors":"Yusuke Okada, Yoshifumi Manabe, T. Okamoto","doi":"10.1504/IJACT.2008.017052","DOIUrl":"https://doi.org/10.1504/IJACT.2008.017052","url":null,"abstract":"Fair exchange protocols allow both or neither of two parties to obtain the other's items, and this property is essential in e-commerce. In this paper, we construct an optimistic fair exchange protocol that is applicable to any digital signature by prescribing three forms of signatures, namely presignature, post-signature and notarised signature. We set an expiration date for presignature, and thus realise the timely termination of the protocol. Next, we define an ideal functionality of fair exchange protocols in the universal composability framework. Then, we construct an optimistic fair exchange protocol based on the above protocol, and prove its security in the universal composability framework.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116946429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Practical key-recovery attack against APOP, an MD5-based challenge-response authentication 针对APOP的实际密钥恢复攻击,一个基于md5的挑战-响应身份验证
Pub Date : 2008-02-01 DOI: 10.1504/IJACT.2008.017049
G. Leurent
Hash functions are used in many cryptographic constructions under various assumptions, and the practical impact of collision attacks is often unclear. In this paper, we show how collisions can be used to recover part of the password used in the APOP authentication protocol. Since we actually need a little more than mere collisions, we look into the details of MD5 collisions. In Wang's attack, message modifications allow to deterministically satisfy certain sufficient conditions to find collisions efficiently. Unfortunately, message modifications significantly change the messages and one has little control over the colliding blocks. In this paper, we show how to choose small parts of the colliding messages, which will allow to build the APOP attack. This shows that collision attacks can be used to attack real protocols, which means that finding collisions is a real threat.
哈希函数在各种假设下用于许多加密结构,并且碰撞攻击的实际影响通常不清楚。在本文中,我们展示了如何使用冲突来恢复APOP身份验证协议中使用的部分密码。由于我们实际上需要的不仅仅是碰撞,因此我们研究MD5碰撞的细节。在Wang的攻击中,消息修改允许确定性地满足某些充分条件来有效地发现碰撞。不幸的是,消息修改会显著地改变消息,并且几乎无法控制冲突块。在本文中,我们展示了如何选择碰撞消息的一小部分,这将允许构建APOP攻击。这表明冲突攻击可以用来攻击真实的协议,这意味着发现冲突是一个真正的威胁。
{"title":"Practical key-recovery attack against APOP, an MD5-based challenge-response authentication","authors":"G. Leurent","doi":"10.1504/IJACT.2008.017049","DOIUrl":"https://doi.org/10.1504/IJACT.2008.017049","url":null,"abstract":"Hash functions are used in many cryptographic constructions under various assumptions, and the practical impact of collision attacks is often unclear. In this paper, we show how collisions can be used to recover part of the password used in the APOP authentication protocol. Since we actually need a little more than mere collisions, we look into the details of MD5 collisions. In Wang's attack, message modifications allow to deterministically satisfy certain sufficient conditions to find collisions efficiently. Unfortunately, message modifications significantly change the messages and one has little control over the colliding blocks. In this paper, we show how to choose small parts of the colliding messages, which will allow to build the APOP attack. This shows that collision attacks can be used to attack real protocols, which means that finding collisions is a real threat.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127136445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Homomorphic encryption and secure comparison 同态加密与安全比较
Pub Date : 2008-02-01 DOI: 10.1504/IJACT.2008.017048
I. Damgård, M. Geisler, Mikkel Krøigaard
We propose a protocol for secure comparison of integers based on homomorphic encryption. We also propose a homomorphic encryption scheme that can be used in our protocol, makes it more efficient than previous solutions, and can also be used as the basis of efficient and general secure Multiparty Computation (MPC). We show how our comparison protocol can be used to improve security of online auctions, and demonstrate that it is efficient enough to be used in practice. For comparison of 16 bits numbers with security based on 1024 bits RSA (executed by two parties), our implementation takes 0.28 sec including all computation and communication. Using precomputation, one can save a factor of roughly 10.
提出了一种基于同态加密的整数安全比较协议。我们还提出了一种可以在我们的协议中使用的同态加密方案,使其比以前的解决方案更有效,并且也可以用作高效和通用安全多方计算(MPC)的基础。我们展示了如何使用我们的比较协议来提高在线拍卖的安全性,并证明它足够有效,可以在实践中使用。将16位数字与基于1024位RSA(双方执行)的安全性进行比较,我们的实现需要0.28秒,包括所有计算和通信。使用预计算,可以节省大约10倍。
{"title":"Homomorphic encryption and secure comparison","authors":"I. Damgård, M. Geisler, Mikkel Krøigaard","doi":"10.1504/IJACT.2008.017048","DOIUrl":"https://doi.org/10.1504/IJACT.2008.017048","url":null,"abstract":"We propose a protocol for secure comparison of integers based on homomorphic encryption. We also propose a homomorphic encryption scheme that can be used in our protocol, makes it more efficient than previous solutions, and can also be used as the basis of efficient and general secure Multiparty Computation (MPC). We show how our comparison protocol can be used to improve security of online auctions, and demonstrate that it is efficient enough to be used in practice. For comparison of 16 bits numbers with security based on 1024 bits RSA (executed by two parties), our implementation takes 0.28 sec including all computation and communication. Using precomputation, one can save a factor of roughly 10.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123413492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 214
Authority revocation scheme for MA-CP-ABE-based secure communication in IoMT ecosystem 基于ma - cp - abe的IoMT生态系统安全通信的权限撤销方案
Pub Date : 1900-01-01 DOI: 10.1504/ijact.2022.10056082
Shardha Porwal, Sangeeta Mittal
{"title":"Authority revocation scheme for MA-CP-ABE-based secure communication in IoMT ecosystem","authors":"Shardha Porwal, Sangeeta Mittal","doi":"10.1504/ijact.2022.10056082","DOIUrl":"https://doi.org/10.1504/ijact.2022.10056082","url":null,"abstract":"","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126489150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trustworthy public randomness with sloth, unicorn, and trx 值得信赖的公共随机与树懒,独角兽和trx
Pub Date : 1900-01-01 DOI: 10.1504/IJACT.2017.10010315
A. Lenstra, B. Wesolowski
Many applications require trustworthy generation of public random numbers. It is shown how this can be achieved using a hash function that is timed to be as slow as desired (sloth), while the correctness of the resulting hash can be verified quickly. It is shown how sloth can be used for uncontestable random number generation (unicorn), and how unicorn can be used for a new trustworthy random elliptic curves service (trx) and random-sample voting.
许多应用程序需要可靠地生成公共随机数。它展示了如何使用一个定时为尽可能慢(sloth)的哈希函数来实现这一点,同时可以快速验证结果哈希的正确性。展示了如何将sloth用于不可争议随机数生成(独角兽),以及如何将独角兽用于新的可信随机椭圆曲线服务(trx)和随机样本投票。
{"title":"Trustworthy public randomness with sloth, unicorn, and trx","authors":"A. Lenstra, B. Wesolowski","doi":"10.1504/IJACT.2017.10010315","DOIUrl":"https://doi.org/10.1504/IJACT.2017.10010315","url":null,"abstract":"Many applications require trustworthy generation of public random numbers. It is shown how this can be achieved using a hash function that is timed to be as slow as desired (sloth), while the correctness of the resulting hash can be verified quickly. It is shown how sloth can be used for uncontestable random number generation (unicorn), and how unicorn can be used for a new trustworthy random elliptic curves service (trx) and random-sample voting.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127638910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
期刊
Int. J. Appl. Cryptogr.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1