首页 > 最新文献

Journal of Information Security and Applications最新文献

英文 中文
NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research NeuroIDBench:基于脑电波的身份验证研究方法标准化的开源基准框架
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-18 DOI: 10.1016/j.jisa.2024.103832
Avinash Kumar Chaurasia , Matin Fallahi , Thorsten Strufe , Philipp Terhörst , Patricia Arias Cabarcos

Biometric systems based on brain activity have been proposed as an alternative to passwords or to complement current authentication techniques. By leveraging the unique brainwave patterns of individuals, these systems offer the possibility of creating authentication solutions that are resistant to theft, hands-free, accessible, and potentially even revocable. However, despite the growing stream of research in this area, faster advance is hindered by reproducibility problems. Issues such as the lack of standard reporting schemes for performance results and system configuration, or the absence of common evaluation benchmarks, make comparability and proper assessment of different biometric solutions challenging. Further, barriers are erected to future work when, as so often, source code is not published open access. To bridge this gap, we introduce NeuroIDBench, a flexible open source tool to benchmark brainwave-based authentication models. It incorporates nine diverse datasets, implements a comprehensive set of pre-processing parameters and machine learning algorithms, enables testing under two common adversary models (known vs unknown attacker), and allows researchers to generate full performance reports and visualizations. We use NeuroIDBench to investigate the shallow classifiers and deep learning-based approaches proposed in the literature, and to test robustness across multiple sessions. We observe a 37.6% reduction in Equal Error Rate (EER) for unknown attacker scenarios (typically not tested in the literature), and we highlight the importance of session variability to brainwave authentication. All in all, our results demonstrate the viability and relevance of NeuroIDBench in streamlining fair comparisons of algorithms, thereby furthering the advancement of brainwave-based authentication through robust methodological practices.

基于大脑活动的生物识别系统已被提出来作为密码的替代品或现有身份验证技术的补充。通过利用个人独特的脑电波模式,这些系统为创建防盗、免提、可访问、甚至可能可撤销的身份验证解决方案提供了可能性。然而,尽管这一领域的研究日益增多,但可重复性问题阻碍了更快的发展。由于缺乏有关性能结果和系统配置的标准报告方案,或缺乏通用的评估基准,因此对不同生物识别解决方案的可比性和适当评估具有挑战性。此外,如果源代码不能公开获取,也会对今后的工作造成障碍。为了弥补这一差距,我们推出了 NeuroIDBench,这是一款灵活的开源工具,用于对基于脑电波的身份验证模型进行基准测试。它整合了九个不同的数据集,实现了一套全面的预处理参数和机器学习算法,可以在两种常见对手模型(已知攻击者与未知攻击者)下进行测试,并允许研究人员生成完整的性能报告和可视化效果。我们使用 NeuroIDBench 研究了文献中提出的浅层分类器和基于深度学习的方法,并测试了跨多个会话的鲁棒性。我们观察到,在未知攻击者场景下(文献中通常未进行测试),等效错误率(EER)降低了 37.6%,我们强调了会话变化对脑电波验证的重要性。总之,我们的结果证明了 NeuroIDBench 在简化算法公平比较方面的可行性和相关性,从而通过稳健的方法论实践进一步推动了基于脑电波的身份验证。
{"title":"NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research","authors":"Avinash Kumar Chaurasia ,&nbsp;Matin Fallahi ,&nbsp;Thorsten Strufe ,&nbsp;Philipp Terhörst ,&nbsp;Patricia Arias Cabarcos","doi":"10.1016/j.jisa.2024.103832","DOIUrl":"10.1016/j.jisa.2024.103832","url":null,"abstract":"<div><p>Biometric systems based on brain activity have been proposed as an alternative to passwords or to complement current authentication techniques. By leveraging the unique brainwave patterns of individuals, these systems offer the possibility of creating authentication solutions that are resistant to theft, hands-free, accessible, and potentially even revocable. However, despite the growing stream of research in this area, faster advance is hindered by reproducibility problems. Issues such as the lack of standard reporting schemes for performance results and system configuration, or the absence of common evaluation benchmarks, make comparability and proper assessment of different biometric solutions challenging. Further, barriers are erected to future work when, as so often, source code is not published open access. To bridge this gap, we introduce NeuroIDBench, a flexible open source tool to benchmark brainwave-based authentication models. It incorporates nine diverse datasets, implements a comprehensive set of pre-processing parameters and machine learning algorithms, enables testing under two common adversary models (known vs unknown attacker), and allows researchers to generate full performance reports and visualizations. We use NeuroIDBench to investigate the shallow classifiers and deep learning-based approaches proposed in the literature, and to test robustness across multiple sessions. We observe a 37.6% reduction in Equal Error Rate (EER) for unknown attacker scenarios (typically not tested in the literature), and we highlight the importance of session variability to brainwave authentication. All in all, our results demonstrate the viability and relevance of NeuroIDBench in streamlining fair comparisons of algorithms, thereby furthering the advancement of brainwave-based authentication through robust methodological practices.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"85 ","pages":"Article 103832"},"PeriodicalIF":3.8,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214212624001340/pdfft?md5=701ee49e0586c993c5933d0f423680fa&pid=1-s2.0-S2214212624001340-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141638326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reversible data hiding in encrypted image based on key-controlled balanced Huffman coding 基于密钥控制平衡哈夫曼编码的加密图像可逆数据隐藏技术
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-11 DOI: 10.1016/j.jisa.2024.103833
Yaolin Yang , Fan Chen , Heng-Ming Tai , Hongjie He , Lingfeng Qu

To achieve privacy protection and effective management in cloud computing, and solve the problem of existing reversible data hiding in encrypted image (RDH-EI) algorithms being unable to resist existing various attacks, an RDH-EI algorithm based on key-controlled balanced Huffman coding (KBHC) is proposed. The novelty lies in KBHC and variable-length bit scrambling. KBHC possesses non-preset, balanced, and key-controlled characteristics, providing the proposed algorithm with high capacity and enhanced security. The non-preset allows coding tables to be adaptively generated based on prediction error maps, resulting in shorter encoded streams for higher embedding capacity. The balanced characteristic is achieved by adjusting the subtrees, so that the balance rate in the encoded stream is 0.014, and can also reach 0.065 for particularly smooth images, achieving uniform distribution of the encoded stream, thereby improving the ability to resist statistical analysis attacks. The random key controls the leaf nodes scrambling in the Huffman tree, which realizes the variability of the encoded stream and avoids the potential security risks caused by timestamp reconstruction, laying the foundation to achieve differential attack security. Variable-length bit scrambling determines the pseudo-random extension length and scrambling sequence by both the encryption key and coding table information, effectively resists brute force attacks and ensures up to 100 % difference rate between scrambling sequences generated in each run. Experimental results demonstrate that compared to several RDH-EI methods, the proposed algorithm achieves higher embedding capacity and security under acceptable complexity. The average embedding rate of three databases reaches 3.897 bpp, and the proposed algorithm effectively resists statistical analysis attacks, COA, KPA, and differential attack.

为了实现云计算中的隐私保护和有效管理,解决现有加密图像中的可逆数据隐藏(RDH-EI)算法无法抵御现有各种攻击的问题,本文提出了一种基于密钥控制平衡哈夫曼编码(KBHC)的 RDH-EI 算法。其新颖之处在于 KBHC 和变长比特扰码。KBHC 具有非预置、平衡和密钥控制的特点,为所提出的算法提供了高容量和更高的安全性。非预设允许根据预测误差图自适应地生成编码表,从而缩短编码流,提高嵌入容量。平衡特性是通过调整子树实现的,因此编码流中的平衡率为 0.014,对于特别平滑的图像还能达到 0.065,实现了编码流的均匀分布,从而提高了抵御统计分析攻击的能力。随机密钥控制 Huffman 树中的叶节点加扰,实现了编码流的可变性,避免了时间戳重构带来的安全隐患,为实现差分攻击的安全性奠定了基础。变长比特加扰通过加密密钥和编码表信息确定伪随机扩展长度和加扰序列,有效抵御暴力破解攻击,确保每次运行产生的加扰序列之间的差异率高达 100%。实验结果表明,与几种 RDH-EI 方法相比,所提出的算法在可接受的复杂度下实现了更高的嵌入容量和安全性。三个数据库的平均嵌入率达到了 3.897 bpp,而且提出的算法能有效抵御统计分析攻击、COA、KPA 和差分攻击。
{"title":"Reversible data hiding in encrypted image based on key-controlled balanced Huffman coding","authors":"Yaolin Yang ,&nbsp;Fan Chen ,&nbsp;Heng-Ming Tai ,&nbsp;Hongjie He ,&nbsp;Lingfeng Qu","doi":"10.1016/j.jisa.2024.103833","DOIUrl":"https://doi.org/10.1016/j.jisa.2024.103833","url":null,"abstract":"<div><p>To achieve privacy protection and effective management in cloud computing, and solve the problem of existing reversible data hiding in encrypted image (RDH-EI) algorithms being unable to resist existing various attacks, an RDH-EI algorithm based on key-controlled balanced Huffman coding (KBHC) is proposed. The novelty lies in KBHC and variable-length bit scrambling. KBHC possesses non-preset, balanced, and key-controlled characteristics, providing the proposed algorithm with high capacity and enhanced security. The non-preset allows coding tables to be adaptively generated based on prediction error maps, resulting in shorter encoded streams for higher embedding capacity. The balanced characteristic is achieved by adjusting the subtrees, so that the balance rate in the encoded stream is 0.014, and can also reach 0.065 for particularly smooth images, achieving uniform distribution of the encoded stream, thereby improving the ability to resist statistical analysis attacks. The random key controls the leaf nodes scrambling in the Huffman tree, which realizes the variability of the encoded stream and avoids the potential security risks caused by timestamp reconstruction, laying the foundation to achieve differential attack security. Variable-length bit scrambling determines the pseudo-random extension length and scrambling sequence by both the encryption key and coding table information, effectively resists brute force attacks and ensures up to 100 % difference rate between scrambling sequences generated in each run. Experimental results demonstrate that compared to several RDH-EI methods, the proposed algorithm achieves higher embedding capacity and security under acceptable complexity. The average embedding rate of three databases reaches 3.897 bpp, and the proposed algorithm effectively resists statistical analysis attacks, COA, KPA, and differential attack.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"84 ","pages":"Article 103833"},"PeriodicalIF":3.8,"publicationDate":"2024-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling security risk assessment and management for business process models 实现业务流程模型的安全风险评估和管理
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-05 DOI: 10.1016/j.jisa.2024.103829
David G. Rosado , Luis E. Sánchez , Ángel Jesús Varela-Vaca , Antonio Santos-Olmo , María Teresa Gómez-López , Rafael M. Gasca , Eduardo Fernández-Medina

Business processes (BP) are considered the enterprise’s cornerstone but are increasingly in the spotlight of attacks. Therefore, the design of business processes must consider the security risks and be adequately integrated into the information and operational systems. However, security risk assessment and management are rarely considered at the level of business processes during design time, let alone considering a risk architecture that takes into account the connection and dependencies of risks at these levels of the organisation, business processes, and information systems. In general, most approaches deal with integrating new artefacts for business process models to support risk analysis, but sometimes, the notation can increase complexity, making it difficult to have a risk management tool to support the analysis. After analysing the current risk processes and frameworks, we have realised that they are often neglected when considering organisational and business process levels. In this paper, MARISMA-BP (MARISMA for Business Process) pattern is proposed, a security risk pattern to enable the assessment and management of risks for business process models. This approach is an artefact that has been validated in a real scenario following the design science methodology. Further, MARISMA-BP pattern is supported by eMARISMA, an automated infrastructure that allows the definition and reuse of each risk component, helping us to carry out the risk assessment and management process in an efficient and dynamic way. To demonstrate the applicability of the proposal, MARISMA-BP pattern is applied to a real health-based business process scenario. The findings illustrate the efficacy of MARISMA-BP within eMARISMA for comprehensive risk assessment and management, underscoring its versatility and practical relevance in any business process environment.

业务流程(BP)被视为企业的基石,但也日益成为攻击的焦点。因此,业务流程的设计必须考虑安全风险,并与信息和运营系统充分整合。然而,在设计时很少考虑业务流程层面的安全风险评估和管理,更不用说考虑风险架构,将组织、业务流程和信息系统这些层面的风险联系和依赖性考虑在内了。一般来说,大多数方法都是为业务流程模型整合新的人工制品,以支持风险分析,但有时,这种符号会增加复杂性,使风险管理工具难以支持分析。在分析了当前的风险流程和框架后,我们意识到,在考虑组织和业务流程层面时,它们往往被忽视。本文提出了 MARISMA-BP(用于业务流程的 MARISMA)模式,这是一种安全风险模式,可用于评估和管理业务流程模型的风险。这种方法是一种人工制品,已按照设计科学方法在真实场景中进行了验证。此外,MARISMA-BP 模式还得到了 eMARISMA 的支持,eMARISMA 是一种自动化基础设施,允许定义和重用每个风险组件,帮助我们以高效、动态的方式开展风险评估和管理流程。为了证明该建议的适用性,MARISMA-BP 模式被应用到一个真实的基于健康的业务流程场景中。研究结果表明,MARISMA-BP 模式在 eMARISMA 系统中能有效地进行全面风险评估和管理,突出了它在任何业务流程环境中的多功能性和实用性。
{"title":"Enabling security risk assessment and management for business process models","authors":"David G. Rosado ,&nbsp;Luis E. Sánchez ,&nbsp;Ángel Jesús Varela-Vaca ,&nbsp;Antonio Santos-Olmo ,&nbsp;María Teresa Gómez-López ,&nbsp;Rafael M. Gasca ,&nbsp;Eduardo Fernández-Medina","doi":"10.1016/j.jisa.2024.103829","DOIUrl":"https://doi.org/10.1016/j.jisa.2024.103829","url":null,"abstract":"<div><p>Business processes (BP) are considered the enterprise’s cornerstone but are increasingly in the spotlight of attacks. Therefore, the design of business processes must consider the security risks and be adequately integrated into the information and operational systems. However, security risk assessment and management are rarely considered at the level of business processes during design time, let alone considering a risk architecture that takes into account the connection and dependencies of risks at these levels of the organisation, business processes, and information systems. In general, most approaches deal with integrating new artefacts for business process models to support risk analysis, but sometimes, the notation can increase complexity, making it difficult to have a risk management tool to support the analysis. After analysing the current risk processes and frameworks, we have realised that they are often neglected when considering organisational and business process levels. In this paper, MARISMA-BP (MARISMA for Business Process) pattern is proposed, a security risk pattern to enable the assessment and management of risks for business process models. This approach is an artefact that has been validated in a real scenario following the design science methodology. Further, MARISMA-BP pattern is supported by eMARISMA, an automated infrastructure that allows the definition and reuse of each risk component, helping us to carry out the risk assessment and management process in an efficient and dynamic way. To demonstrate the applicability of the proposal, MARISMA-BP pattern is applied to a real health-based business process scenario. The findings illustrate the efficacy of MARISMA-BP within eMARISMA for comprehensive risk assessment and management, underscoring its versatility and practical relevance in any business process environment.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"84 ","pages":"Article 103829"},"PeriodicalIF":3.8,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214212624001315/pdfft?md5=79e2b72fbb70dc8c5f2f35e3717059dc&pid=1-s2.0-S2214212624001315-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141542098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Specifying cycles of minimal length for commonly used linear layers in block ciphers 为块状密码中常用的线性层指定最小长度的周期
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-04 DOI: 10.1016/j.jisa.2024.103824
Guoqiang Deng , Yongzhuang Wei , Xuefeng Duan , Enes Pasalic , Samir Hodžić

Nonlinear invariant attack applied to lightweight block ciphers relies on the existence of a nonlinear invariant g:F2nF2 for the round function. Whereas invariants of the entire S-box layer have been studied in terms of the corresponding cycle structure, a similar analysis for the linear layer has not been performed yet. In this article, we provide a theoretical analysis for specifying the minimal length of cycles for commonly used linear permutations in lightweight block ciphers. Namely, using a suitable matrix representation, we exactly specify the minimal cycle lengths for those linear layers that employ ShiftRows, Rotational-XOR and circular Boolean matrix operations which can be found in many well-known families of block ciphers. These results are practically useful for the purpose of finding nonlinear invariants of the entire encryption rounds since these can be specified using the intersection of cycles corresponding to the linear and S-box layer. We also apply our theoretical analysis practically and specify minimal cycle lengths of linear layers for certain families of block ciphers including some NIST candidates.

应用于轻量级块密码的非线性不变量攻击依赖于轮函数的非线性不变量 g:F2n→F2 的存在。虽然已经根据相应的循环结构研究了整个 S 盒层的不变量,但还没有对线性层进行类似的分析。在本文中,我们提供了一种理论分析,用于指定轻量级块密码中常用线性排列的最小循环长度。也就是说,利用合适的矩阵表示法,我们精确地指定了采用 ShiftRows、Rotational-XOR 和循环布尔矩阵操作的线性层的最小循环长度,这些操作在许多著名的块密码系列中都能找到。这些结果对于寻找整个加密轮的非线性不变式非常有用,因为这些不变式可以用线性层和 S 盒层对应的循环交集来指定。我们还实际应用了我们的理论分析,并为包括一些 NIST 候选者在内的某些系列的块密码指定了线性层的最小周期长度。
{"title":"Specifying cycles of minimal length for commonly used linear layers in block ciphers","authors":"Guoqiang Deng ,&nbsp;Yongzhuang Wei ,&nbsp;Xuefeng Duan ,&nbsp;Enes Pasalic ,&nbsp;Samir Hodžić","doi":"10.1016/j.jisa.2024.103824","DOIUrl":"https://doi.org/10.1016/j.jisa.2024.103824","url":null,"abstract":"<div><p>Nonlinear invariant attack applied to lightweight block ciphers relies on the existence of a nonlinear invariant <span><math><mrow><mi>g</mi><mo>:</mo><msubsup><mrow><mi>F</mi></mrow><mrow><mn>2</mn></mrow><mrow><mi>n</mi></mrow></msubsup><mo>→</mo><msub><mrow><mi>F</mi></mrow><mrow><mn>2</mn></mrow></msub></mrow></math></span> for the round function. Whereas invariants of the entire S-box layer have been studied in terms of the corresponding cycle structure, a similar analysis for the linear layer has not been performed yet. In this article, we provide a theoretical analysis for specifying the minimal length of cycles for commonly used linear permutations in lightweight block ciphers. Namely, using a suitable matrix representation, we exactly specify the minimal cycle lengths for those linear layers that employ ShiftRows, Rotational-XOR and circular Boolean matrix operations which can be found in many well-known families of block ciphers. These results are practically useful for the purpose of finding nonlinear invariants of the entire encryption rounds since these can be specified using the intersection of cycles corresponding to the linear and S-box layer. We also apply our theoretical analysis practically and specify minimal cycle lengths of linear layers for certain families of block ciphers including some NIST candidates.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"84 ","pages":"Article 103824"},"PeriodicalIF":3.8,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141542111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SL3PAKE: Simple Lattice-based Three-party Password Authenticated Key Exchange for post-quantum world SL3PAKE: 面向后量子世界的基于简单晶格的三方密码验证密钥交换系统
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-02 DOI: 10.1016/j.jisa.2024.103826
Vivek Dabra , Saru Kumari , Anju Bala , Sonam Yadav

Three-party Password Authenticated Key Exchange (3PAKE) is a protocol where two parties generate the same session key with the help of a trusted server. With the evolution of quantum computers, there is a growing need to develop the 3PAKE protocols that can resist the quantum attacks. Hence, various 3PAKE protocols have been proposed based on the famous Ring Learning With Error (RLWE) problem. But we find out that all these protocols are vulnerable to signal leakage attacks if their public/private keys are reused. Also, the design of these protocols are pretty complex, thus making these protocols highly inefficient. Hence, to overcome the above issues, we have proposed Simple Lattice-based 3PAKE (SL3PAKE), which is simple in its design and resists signal leakage attack if its public/private keys are reused. The order and flow of messages in the proposed SL3PAKE protocol is quite natural without added complexity, thus makes it simple 3PAKE protocol. Finally, we present the comparative analysis based on communication overhead among the proposed SL3PAKE and other three-party protocols. From the analysis, it has been shown that the proposed SL3PAKE protocol has much less communication overhead/communication rounds than the other three-party protocols.

三方密码验证密钥交换(3PAKE)是一种双方在可信服务器的帮助下生成相同会话密钥的协议。随着量子计算机的发展,人们越来越需要开发能抵御量子攻击的 3PAKE 协议。因此,人们根据著名的有误环学习(RLWE)问题提出了各种 3PAKE 协议。但我们发现,如果公钥/私钥被重复使用,所有这些协议都容易受到信号泄漏攻击。此外,这些协议的设计也相当复杂,因此效率很低。因此,为了克服上述问题,我们提出了基于简单网格的 3PAKE(SL3PAKE),该协议设计简单,并且在公钥/私钥被重复使用的情况下能抵御信号泄漏攻击。拟议的 SL3PAKE 协议中信息的顺序和流程非常自然,没有增加复杂性,因此是一种简单的 3PAKE 协议。最后,我们根据通信开销对所提出的 SL3PAKE 协议和其他三方协议进行了比较分析。分析表明,与其他三方协议相比,拟议的 SL3PAKE 协议的通信开销/通信轮数要少得多。
{"title":"SL3PAKE: Simple Lattice-based Three-party Password Authenticated Key Exchange for post-quantum world","authors":"Vivek Dabra ,&nbsp;Saru Kumari ,&nbsp;Anju Bala ,&nbsp;Sonam Yadav","doi":"10.1016/j.jisa.2024.103826","DOIUrl":"https://doi.org/10.1016/j.jisa.2024.103826","url":null,"abstract":"<div><p>Three-party Password Authenticated Key Exchange (3PAKE) is a protocol where two parties generate the same session key with the help of a trusted server. With the evolution of quantum computers, there is a growing need to develop the 3PAKE protocols that can resist the quantum attacks. Hence, various 3PAKE protocols have been proposed based on the famous Ring Learning With Error (RLWE) problem. But we find out that all these protocols are vulnerable to signal leakage attacks if their public/private keys are reused. Also, the design of these protocols are pretty complex, thus making these protocols highly inefficient. Hence, to overcome the above issues, we have proposed Simple Lattice-based 3PAKE (SL3PAKE), which is simple in its design and resists signal leakage attack if its public/private keys are reused. The order and flow of messages in the proposed SL3PAKE protocol is quite natural without added complexity, thus makes it simple 3PAKE protocol. Finally, we present the comparative analysis based on communication overhead among the proposed SL3PAKE and other three-party protocols. From the analysis, it has been shown that the proposed SL3PAKE protocol has much less communication overhead/communication rounds than the other three-party protocols.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"84 ","pages":"Article 103826"},"PeriodicalIF":3.8,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141542238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic-anonymous privacy-preserving authenticated aggregation for safety-warning system for the Internet of Vehicles 用于车联网安全预警系统的动态匿名隐私保护认证聚合系统
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-29 DOI: 10.1016/j.jisa.2024.103830
Girraj Kumar Verma , Nahida Majeed Wani , Saurabh Rana , Neeraj Kumar , Asheesh Tiwari

Currently, the connectivity of vehicles using the latest communication and computing technologies has grown as the Internet of Vehicles (IoV). IoV has been utilized to foster an easy traffic flow by sharing safety-warning messages. However, authentication and confidentiality of shared information is a challenging issue. To solve the problem, various privacy-preserving authenticated data-aggregation schemes have been devised. However, existing schemes have shortcomings specifically concerning a heavy computational cost, and the need for a secure channel. Besides, static pseudonyms may increase the risk of a vehicle’s privacy leakage. In response to these challenges, this study introduces a new pairing-less and secure privacy-preserving authenticated data aggregation (PLS-PPADA) scheme. Leveraging the pairing-less and certificate-based setting, the PLS-PPADA scheme emerges as a robust, efficient, and effective solution for safety-warning systems in IoV. Further, to resolve the risk of privacy leakage due to static pseudonyms, the paradigm of fuzzy identity has been utilized. Thus, it achieves efficiency and dynamic anonymity and also does not require a secure channel for key sharing. A comprehensive security analysis underscores its effective data protection capabilities and efficiency comparison presents it as a compelling alternative to existing state-of-the-art schemes.

目前,使用最新通信和计算技术的车辆连接已发展成为车联网(IoV)。通过共享安全警告信息,IoV 已被用于促进便捷的交通流。然而,共享信息的认证和保密是一个具有挑战性的问题。为了解决这个问题,人们设计了各种隐私保护认证数据聚合方案。然而,现有方案都存在不足之处,特别是计算成本高,而且需要安全通道。此外,静态假名可能会增加车辆隐私泄露的风险。针对这些挑战,本研究提出了一种新的无配对安全隐私保护认证数据聚合(PLS-PPADA)方案。利用无配对和基于证书的设置,PLS-PPADA 方案成为物联网安全预警系统的稳健、高效和有效的解决方案。此外,为了解决静态假名造成的隐私泄露风险,还利用了模糊身份范式。因此,它实现了高效和动态匿名,而且不需要安全通道来共享密钥。全面的安全分析强调了其有效的数据保护能力,而效率比较则表明它是现有最先进方案的一个令人信服的替代方案。
{"title":"Dynamic-anonymous privacy-preserving authenticated aggregation for safety-warning system for the Internet of Vehicles","authors":"Girraj Kumar Verma ,&nbsp;Nahida Majeed Wani ,&nbsp;Saurabh Rana ,&nbsp;Neeraj Kumar ,&nbsp;Asheesh Tiwari","doi":"10.1016/j.jisa.2024.103830","DOIUrl":"https://doi.org/10.1016/j.jisa.2024.103830","url":null,"abstract":"<div><p>Currently, the connectivity of vehicles using the latest communication and computing technologies has grown as the Internet of Vehicles (IoV). IoV has been utilized to foster an easy traffic flow by sharing safety-warning messages. However, authentication and confidentiality of shared information is a challenging issue. To solve the problem, various privacy-preserving authenticated data-aggregation schemes have been devised. However, existing schemes have shortcomings specifically concerning a heavy computational cost, and the need for a secure channel. Besides, static pseudonyms may increase the risk of a vehicle’s privacy leakage. In response to these challenges, this study introduces a new pairing-less and secure privacy-preserving authenticated data aggregation (PLS-PPADA) scheme. Leveraging the pairing-less and certificate-based setting, the PLS-PPADA scheme emerges as a robust, efficient, and effective solution for safety-warning systems in IoV. Further, to resolve the risk of privacy leakage due to static pseudonyms, the paradigm of fuzzy identity has been utilized. Thus, it achieves efficiency and dynamic anonymity and also does not require a secure channel for key sharing. A comprehensive security analysis underscores its effective data protection capabilities and efficiency comparison presents it as a compelling alternative to existing state-of-the-art schemes.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"84 ","pages":"Article 103830"},"PeriodicalIF":3.8,"publicationDate":"2024-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141485986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AFTLNet: An efficient adaptive forgery traces learning network for deep image inpainting localization AFTLNet:用于深度图像绘制定位的高效自适应伪造痕迹学习网络
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-28 DOI: 10.1016/j.jisa.2024.103825
Xiangling Ding, Yingqian Deng, Yulin Zhao, Wenyi Zhu

Deep-learning-based image inpainting repairs a region with visually believable content, leaving behind imperceptible traces. Since deep image inpainting approaches can malevolently remove key objects and erase visible copyright watermarks, the desire for an effective method to distinguish the inpainted regions has become urgent. In this work, we propose an adaptive forgery trace learning network (AFTLN), which consists of two subblocks: the adaptive block and the Densenet block. Specifically, the adaptive block exploits an adaptive difference convolution to maximize the forgery traces by iteratively updating its weights. Meanwhile, the Densenet block improves the feature weights and reduces the impact of noise on the forgery traces. An image-inpainting detector, namely AFTLNet, is designed by integrating AFTLN with neural architecture search, and global and local attention modules, which aims to find potential tampered regions, enhance feature consistency, and reduce intra-class differences, respectively. The experimental results present that our proposed AFTLNet exceeds existing inpainting detection approaches. Finally, an inpainting dataset of 26K image pairs is constructed for future research. The dataset is available at https://pan.baidu.com/s/10SRJeQBNnTHJXvxl8xzHcg with password: 1234.

基于深度学习的图像内绘可以修复具有视觉可信内容的区域,并留下不易察觉的痕迹。由于深度图像绘制方法会恶意移除关键对象并擦除可见的版权水印,因此迫切需要一种有效的方法来区分绘制区域。在这项工作中,我们提出了一种自适应伪造痕迹学习网络(AFTLN),它由两个子块组成:自适应块和 Densenet 块。具体来说,自适应块利用自适应差分卷积,通过迭代更新权重来最大化伪造痕迹。同时,Densenet 块改进了特征权重,降低了噪声对伪造痕迹的影响。通过将 AFTLN 与神经架构搜索、全局和局部注意力模块相结合,设计了一种图像绘制检测器,即 AFTLNet,其目的分别是查找潜在的篡改区域、增强特征一致性和减少类内差异。实验结果表明,我们提出的 AFTLNet 超越了现有的画中画检测方法。最后,我们构建了一个包含 26K 对图像的涂色数据集,供未来研究使用。该数据集可在 https://pan.baidu.com/s/10SRJeQBNnTHJXvxl8xzHcg 上获取,密码为:1234。
{"title":"AFTLNet: An efficient adaptive forgery traces learning network for deep image inpainting localization","authors":"Xiangling Ding,&nbsp;Yingqian Deng,&nbsp;Yulin Zhao,&nbsp;Wenyi Zhu","doi":"10.1016/j.jisa.2024.103825","DOIUrl":"https://doi.org/10.1016/j.jisa.2024.103825","url":null,"abstract":"<div><p>Deep-learning-based image inpainting repairs a region with visually believable content, leaving behind imperceptible traces. Since deep image inpainting approaches can malevolently remove key objects and erase visible copyright watermarks, the desire for an effective method to distinguish the inpainted regions has become urgent. In this work, we propose an adaptive forgery trace learning network (AFTLN), which consists of two subblocks: the adaptive block and the Densenet block. Specifically, the adaptive block exploits an adaptive difference convolution to maximize the forgery traces by iteratively updating its weights. Meanwhile, the Densenet block improves the feature weights and reduces the impact of noise on the forgery traces. An image-inpainting detector, namely AFTLNet, is designed by integrating AFTLN with neural architecture search, and global and local attention modules, which aims to find potential tampered regions, enhance feature consistency, and reduce intra-class differences, respectively. The experimental results present that our proposed AFTLNet exceeds existing inpainting detection approaches. Finally, an inpainting dataset of 26K image pairs is constructed for future research. The dataset is available at <span>https://pan.baidu.com/s/10SRJeQBNnTHJXvxl8xzHcg</span><svg><path></path></svg> with password: 1234.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"84 ","pages":"Article 103825"},"PeriodicalIF":3.8,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141485985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting malicious DoH traffic: Leveraging small sample analysis and adversarial networks for detection 检测恶意 DoH 流量:利用小样本分析和对抗网络进行检测
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-28 DOI: 10.1016/j.jisa.2024.103827
Shaoqian Wu, Wei Wang, Zhanmeng Ding

In light of the escalating frequency of DNS attacks, it is imperative to bolster user security and privacy through the encryption of DNS queries. However, conventional methods for detecting DNS traffic are no longer effective in identifying encrypted traffic, particularly with the utilization of the DNS-over-HTTPS (DoH) protocol, which employs secure HTTPS for DNS resolution. To confront this challenge, we propose a novel model for detecting malicious DoH traffic, named DoH-TriCGAN, which distinguishes between non-DoH, benign DoH, and malicious DoH traffic. DoH-TriCGAN employs a conditional generative adversarial network comprising three network components, for which we only provide additional information to the generator. We extracted different small sample datasets and large sample dataset from the CIRA-CIC-DoHBrw-2020 dataset, to evaluate the efficiency and effectiveness of the proposed DoH-TriCGAN model, and compared the quality of the generated synthetic data. To establish a benchmark, we utilized the six metrics – accuracy, precision, recall, F1-score, ROC_AUC, and PR_AUC – to assess the performance of our model. The results demonstrate our proposed model outperforms the other five models (RF, XGBoost, BiGRU, Autoencoder, Transformer), showing the best performance particularly in scenarios with limited training samples, while also demonstrating data expansion capabilities by generating high-quality synthetic data to address the issue of insufficient network traffic.

鉴于 DNS 攻击日益频繁,必须通过加密 DNS 查询来加强用户安全和隐私保护。然而,传统的 DNS 流量检测方法已无法有效识别加密流量,尤其是在使用安全 HTTPS 进行 DNS 解析的 DNS-over-HTTPS (DoH)协议的情况下。为了应对这一挑战,我们提出了一种用于检测恶意 DoH 流量的新型模型,命名为 DoH-TriCGAN,它能区分非 DoH、良性 DoH 和恶意 DoH 流量。DoH-TriCGAN 采用了一个条件生成式对抗网络,由三个网络组件组成,我们只向生成器提供额外的信息。我们从 CIRA-CIC-DoHBrw-2020 数据集中提取了不同的小样本数据集和大样本数据集,以评估所提出的 DoH-TriCGAN 模型的效率和有效性,并比较了生成的合成数据的质量。为了建立基准,我们使用了准确率、精确度、召回率、F1-score、ROC_AUC 和 PR_AUC 这六个指标来评估模型的性能。结果表明,我们提出的模型优于其他五个模型(RF、XGBoost、BiGRU、Autoencoder、Transformer),尤其是在训练样本有限的情况下表现最佳,同时还通过生成高质量的合成数据来解决网络流量不足的问题,从而展示了数据扩展能力。
{"title":"Detecting malicious DoH traffic: Leveraging small sample analysis and adversarial networks for detection","authors":"Shaoqian Wu,&nbsp;Wei Wang,&nbsp;Zhanmeng Ding","doi":"10.1016/j.jisa.2024.103827","DOIUrl":"https://doi.org/10.1016/j.jisa.2024.103827","url":null,"abstract":"<div><p>In light of the escalating frequency of DNS attacks, it is imperative to bolster user security and privacy through the encryption of DNS queries. However, conventional methods for detecting DNS traffic are no longer effective in identifying encrypted traffic, particularly with the utilization of the DNS-over-HTTPS (DoH) protocol, which employs secure HTTPS for DNS resolution. To confront this challenge, we propose a novel model for detecting malicious DoH traffic, named DoH-TriCGAN, which distinguishes between non-DoH, benign DoH, and malicious DoH traffic. DoH-TriCGAN employs a conditional generative adversarial network comprising three network components, for which we only provide additional information to the generator. We extracted different small sample datasets and large sample dataset from the CIRA-CIC-DoHBrw-2020 dataset, to evaluate the efficiency and effectiveness of the proposed DoH-TriCGAN model, and compared the quality of the generated synthetic data. To establish a benchmark, we utilized the six metrics – accuracy, precision, recall, F1-score, ROC_AUC, and PR_AUC – to assess the performance of our model. The results demonstrate our proposed model outperforms the other five models (RF, XGBoost, BiGRU, Autoencoder, Transformer), showing the best performance particularly in scenarios with limited training samples, while also demonstrating data expansion capabilities by generating high-quality synthetic data to address the issue of insufficient network traffic.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"84 ","pages":"Article 103827"},"PeriodicalIF":3.8,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141485946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Statistical privacy protection for secure data access control in cloud 为云计算中的安全数据访问控制提供统计隐私保护
IF 3.8 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-27 DOI: 10.1016/j.jisa.2024.103823
Yaser Baseri , Abdelhakim Hafid , Mahdi Daghmehchi Firoozjaei , Soumaya Cherkaoui , Indrakshi Ray

Cloud Service Providers (CSPs) allow data owners to migrate their data to resource-rich and powerful cloud servers and provide access to this data by individual users. Some of this data may be highly sensitive and important and CSPs cannot always be trusted to provide secure access. It is also important for end users to protect their identities against malicious authorities and providers, when they access services and data. Attribute-Based Encryption (ABE) is an end-to-end public key encryption mechanism, which provides secure and reliable fine-grained access control over encrypted data using defined policies and constraints. Since, in ABE, users are identified by their attributes and not by their identities, collecting and analyzing attributes may reveal their identities and violate their anonymity. Towards this end, we define a new anonymity model in the context of ABE. We analyze several existing anonymous ABE schemes and identify their vulnerabilities in user authorization and user anonymity protection. Subsequently, we propose a Privacy-Preserving Access Control Scheme (PACS), which supports multi-authority, anonymizes user identity, and is immune against users collusion attacks, authorities collusion attacks and chosen plaintext attacks. We also propose an extension of PACS, called Statistical Privacy-Preserving Access Control Scheme (SPACS), which supports statistical anonymity even if malicious authorities and providers statistically analyze the attributes. Lastly, we show that the efficiency of our scheme is comparable to other existing schemes. Our analysis show that SPACS can successfully protect against Collision Attacks and Chosen Plaintext Attacks.

云服务提供商(CSP)允许数据所有者将其数据迁移到资源丰富、功能强大的云服务器上,并允许个人用户访问这些数据。其中一些数据可能高度敏感和重要,因此不能总是相信云服务提供商能够提供安全访问。同样重要的是,终端用户在访问服务和数据时,要保护自己的身份不受恶意机构和提供商的攻击。基于属性的加密(ABE)是一种端到端公钥加密机制,它利用定义的策略和约束对加密数据提供安全可靠的细粒度访问控制。由于在 ABE 中,用户是通过属性而不是身份来识别的,因此收集和分析属性可能会泄露用户的身份并侵犯其匿名性。为此,我们在 ABE 中定义了一种新的匿名模型。我们分析了几种现有的匿名 ABE 方案,找出了它们在用户授权和用户匿名保护方面的漏洞。随后,我们提出了一种隐私保护访问控制方案(PACS),它支持多授权、用户身份匿名化,并能抵御用户串通攻击、机构串通攻击和选择明文攻击。我们还提出了 PACS 的扩展方案,称为统计隐私保护访问控制方案(SPACS),即使恶意机构和提供商对属性进行统计分析,该方案也能支持统计匿名性。最后,我们证明了我们方案的效率与其他现有方案相当。我们的分析表明,SPACS 可以成功抵御碰撞攻击和选择纯文本攻击。
{"title":"Statistical privacy protection for secure data access control in cloud","authors":"Yaser Baseri ,&nbsp;Abdelhakim Hafid ,&nbsp;Mahdi Daghmehchi Firoozjaei ,&nbsp;Soumaya Cherkaoui ,&nbsp;Indrakshi Ray","doi":"10.1016/j.jisa.2024.103823","DOIUrl":"https://doi.org/10.1016/j.jisa.2024.103823","url":null,"abstract":"<div><p><em>Cloud Service Providers</em> (<em>CSP</em>s) allow data owners to migrate their data to resource-rich and powerful cloud servers and provide access to this data by individual users. Some of this data may be highly sensitive and important and <em>CSP</em>s cannot always be trusted to provide secure access. It is also important for end users to protect their identities against malicious authorities and providers, when they access services and data. <em>Attribute-Based Encryption</em> (<em>ABE</em>) is an end-to-end public key encryption mechanism, which provides secure and reliable fine-grained access control over encrypted data using defined policies and constraints. Since, in <em>ABE</em>, users are identified by their attributes and not by their identities, collecting and analyzing attributes may reveal their identities and violate their anonymity. Towards this end, we define a new anonymity model in the context of <em>ABE</em>. We analyze several existing anonymous <em>ABE</em> schemes and identify their vulnerabilities in user authorization and user anonymity protection. Subsequently, we propose a <em>Privacy-Preserving Access Control Scheme (PACS)</em>, which supports multi-authority, anonymizes user identity, and is immune against users collusion attacks, authorities collusion attacks and chosen plaintext attacks. We also propose an extension of <em>PACS</em>, called <em>Statistical Privacy-Preserving Access Control Scheme (SPACS)</em>, which supports statistical anonymity even if malicious authorities and providers statistically analyze the attributes. Lastly, we show that the efficiency of our scheme is comparable to other existing schemes. Our analysis show that <em>SPACS</em> can successfully protect against <em>Collision Attacks</em> and <em>Chosen Plaintext Attacks</em>.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"84 ","pages":"Article 103823"},"PeriodicalIF":3.8,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2214212624001261/pdfft?md5=a547f9409c23468b9558ba93b652bd43&pid=1-s2.0-S2214212624001261-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141485984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ciphertext policy attribute-based encryption scheme supporting Boolean circuits over ideal lattices 基于密文策略属性的加密方案,支持理想网格上的布尔电路
IF 5.6 2区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-19 DOI: 10.1016/j.jisa.2024.103822
Chao Ma, Haiying Gao, Bin Hu

Considering the existence of fast implementation methods for multiplication operations over ideal lattices, we constructed a selectively secure ciphertext policy attribute-based encryption scheme supporting Boolean circuits based non-monotonic linear secret sharing scheme. It uses the trapdoor generation algorithm TrapGen to generate the public parameters and the preimage sampling algorithm SamplePre to embed the public parameters and randomness into the user’s secret key, which achieves the randomization of the secret key. The sharing and reconstruction of the secret in the encryption and decryption algorithm are achieved by a non-monotonic linear secret sharing scheme. Compared to the existing ciphertext policy attribute-based encryption schemes based on a similar sampling algorithm, the size of the ciphertext is significantly reduced.

考虑到理想网格上乘法运算存在快速实现方法,我们构建了一种选择性安全密文策略属性加密方案,支持基于布尔电路的非单调线性秘密共享方案。它利用陷阱门生成算法 TrapGen 生成公开参数,并利用前图像采样算法 SamplePre 将公开参数和随机性嵌入到用户的秘钥中,实现了秘钥的随机化。加解密算法中的密文共享和重构是通过非单调线性密文共享方案实现的。与现有的基于类似采样算法的密文策略属性加密方案相比,密文的大小大大减小。
{"title":"Ciphertext policy attribute-based encryption scheme supporting Boolean circuits over ideal lattices","authors":"Chao Ma,&nbsp;Haiying Gao,&nbsp;Bin Hu","doi":"10.1016/j.jisa.2024.103822","DOIUrl":"https://doi.org/10.1016/j.jisa.2024.103822","url":null,"abstract":"<div><p>Considering the existence of fast implementation methods for multiplication operations over ideal lattices, we constructed a selectively secure ciphertext policy attribute-based encryption scheme supporting Boolean circuits based non-monotonic linear secret sharing scheme. It uses the trapdoor generation algorithm <span>TrapGen</span> to generate the public parameters and the preimage sampling algorithm <span>SamplePre</span> to embed the public parameters and randomness into the user’s secret key, which achieves the randomization of the secret key. The sharing and reconstruction of the secret in the encryption and decryption algorithm are achieved by a non-monotonic linear secret sharing scheme. Compared to the existing ciphertext policy attribute-based encryption schemes based on a similar sampling algorithm, the size of the ciphertext is significantly reduced.</p></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"84 ","pages":"Article 103822"},"PeriodicalIF":5.6,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141429431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information Security and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1