-
201
Proxy re-encryption based multi-factor access control scheme in cloud
Published 2018-02-01“…Cloud computing is one of the space-ground integration information network applications.Users can access data and retrieve service easily and quickly in cloud.The confidentiality and integrity of the data cloud have a direct correspondence to data security of the space-ground integration information network.Thus the data in cloud is transferred with encrypted form to protect the information.As an important technology of cloud security,access control should take account of multi-factor and cipher text to satisfy the complex requirement for cloud data protection.Based on this,a proxy re-encryption based multi-factor access control (PRE-MFAC) scheme was proposed.Firstly,the aims and assumptions of PRE-MFAC were given.Secondly,the system model and algorithm was defined.Finally,the security and properties of PRE-MFAC were analyzed.The proposed scheme has combined the PRE and multi-factor access control together and realized the multi-factor permission management of cipher text in cloud.Meanwhile,it can make the best possible use of cloud in computing and storing,then reduce the difficulty of personal user in cryptographic computing and key managing.…”
Get full text
Article -
202
Hierarchical Node Replication Attacks Detection in Wireless Sensor Networks
Published 2013-04-01“…When nodes may be compromised, “beyond cryptography” algorithmic solutions must be envisaged to complement the cryptographic solutions. This paper addresses the problem of nodes replication; that is, an adversary captures one or several nodes and inserts duplicated nodes at any location in the network. …”
Get full text
Article -
203
Provably secure quantum resistance two-server password-authenticated key exchange protocol
Published 2022-03-01“…Aiming at the problem that the lattice-based single-sever password-authenticated key exchange (PAKE) protocols are not resistant to server compromise attack, while the existing lattice-based multi-server PAKE protocols are inefficient and incompatible with two-server scenarios.The first lattice-based two-party smooth projective hash function (SPHF) was proposed by utilizing the learning with errors (LWE), which was indistinguishability under adaptive chosen-ciphertext attack(IND-CCA2) secure.The parameters of the based public key encryption (PKE) scheme were also identified.On this basis, pertinent two-server PAKE protocols from lattices were designed countering both passive and active attackers.The two quantum resistance protocols were able to achieve password-only settings and the expensive cryptographic primitives were not used, including signature/verification, fully homomorphic encryption and secret sharing.The utilization of zero knowledge proofs were avoided by the protocol under the passive attackers.In the standard model, rigorous security proofs were provided for the two proposed protocols.Experimental results show that the proposed SPHF and PAKE protocols exhibit higher execution efficiency.…”
Get full text
Article -
204
Blind video watermarking algorithm based on correlations between neighboring frames
Published 2006-01-01“…A blind video watermarking method was proposed,in which the watermark composed of symbol part and in-formation part was embedded into the original video frames.After some video frames hiding the watermark were selected randomly from one segment of the video sequences,the symbol water mark was embedded into low frequency discrete cosine transform(DCT) coefficients of fixed blocks of such frames,whereas the information water mark was embedded into direct current coefficients of some other blocks selected by a cryptographic key.Repeat embedding till the whole video was watermarked.To extract the information watermark,the frames holding watermark were found out by detect-ing water the symbol mark rapidly from one video segment whose length was long enough to hold the whole watermark.Then,by using the high correlations between the watermarked frame and its neighboring frames,the pixel values of the blocks where the watermark was embedded can be well estimated.Comparing the estimated values with the current val-ues in the corresponding positions,the information watermark could be reconstructed.Experimental results show that this video watermarking method is robust against attacks such as compression,scaling,frame dropping,etc.…”
Get full text
Article -
205
The Design Management and Developing Design Brief A Critique on the Book The Design Brief book
Published 2021-10-01“…The thematic relationship between the content of some chapters is not sufficiently coherent, although it does include some key points in the design of cryptographic design and design management.…”
Get full text
Article -
206
Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS
Published 2016-01-01“…However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. …”
Get full text
Article -
207
APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks
Published 2013-06-01“…In addition, that work mainly relies on cryptographic tools, in which key distribution is not a trivial task and also causes a large amount of computation overhead. …”
Get full text
Article -
208
Quantum Algorithms for the Physical Layer: Potential Applications to Physical Layer Security
Published 2025-01-01“…Meanwhile, as an alternative to cryptographic methods, physical layer security (PLS) has been extensively studied as a means to realize secure wireless communication that is resistant to attacks by both classical and quantum computers, i.e., quantum-safe. …”
Get full text
Article -
209
ECMO: An Efficient and Confidential Outsourcing Protocol for Medical Data
Published 2025-01-01“…However, this shift introduces critical security and privacy risks, as sensitive patient information is stored on untrusted third-party servers. Existing cryptographic solutions, such as searchable encryption, offer some security guarantees but struggle with challenges like leakage-based attacks, high computational overhead, and limited scalability. …”
Get full text
Article -
210
TS-PAID: A Two-Stage PUF-Based Lightweight Authentication Protocol for Internet of Drones
Published 2025-01-01“…Owing to energy, storage and computational resource-constraints, the complex and heavy cryptographic solutions could not be directly deployed in IoD environment. …”
Get full text
Article -
211
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Published 2021-01-01“…Abstract Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting. …”
Get full text
Article -
212
A Secure 3-Way Routing Protocols for Intermittently Connected Mobile Ad Hoc Networks
Published 2014-01-01“…Though these techniques generate effective results, in this paper, we propose novel routing algorithms grounded on agent and cryptographic techniques, namely, location dissemination service (LoDiS) routing with agent AES, A-LoDiS with agent AES routing, and B-LoDiS with agent AES routing, ensuring optimal results with respect to various network routing parameters. …”
Get full text
Article -
213
Load-to-store: exploit the time leakage of store buffer transient window
Published 2023-04-01“…To research the vulnerability of modern microarchitecture and consider the mitigation, memory order buffer which was responsible for managing the execution order of memory access instructions was analyzed and found that load forward would directly bypass the data of dependent store instructions to load instructions, and speculative load would execute independent load instructions in advance.While bring efficiency optimizations, it might also lead to errors and corresponding blocking.The existing optimization mechanisms on the Intel Coffee Lake microarchitecture, and the leak attack scheme by using them were analyzed.Using the four execution modes of MOB and the corresponding duration, a variety of attacks were constructed including transient attack, covert channel, and recovery of the private key of the cryptographic algorithm.The time difference caused by MOB was used to leak the address of memory instructions, and the implementation of AES T table was attacked.Key recovery experiments were conducted on AES-128 with OpenSSL 3.0.0 on an Intel i5-9400 processor.The experimental results show that 30 000 sets of samples can recover a key byte with a probability of 63.6%.Due to the characteristics of memory order buffer, the concealment of the exploit is better than traditional cache time leaks.…”
Get full text
Article -
214
Secure and Privacy Enhanced Gait Authentication on Smart Phone
Published 2014-01-01“…Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. …”
Get full text
Article -
215
Cumulated Checksum and Dynamic Addresses for Secure Wireless Sensor Networks
Published 2016-07-01“…Passive attacks such as eavesdropping and traffic analysis cannot be eliminated even if cryptographic technologies are used. Conventional frames are usually designed to include checksum, which facilitates to adversaries capturing correct frames for further attacks. …”
Get full text
Article -
216
A New Image Encryption Method Using an Optimized Smart Codebook
Published 2025-01-01“…The assessment of the proposed encryption method demonstrates its resilience against cryptographic attacks, affirming its security and precision. …”
Get full text
Article -
217
Time synchronization attack detection for industrial wireless network
Published 2023-06-01“…High-precision time synchronization is the basis for ensuring the secure and reliable transmission of industrial wireless network (IWN).Delay attacks, as a class of time synchronization attacks which cannot be solved by cryptographic techniques, seriously threaten the secure operation of IWN.Firstly, based on the in-depth analysis on the time synchronization mechanisms of IWN, three-time synchronization attack models were proposed, including the one-way full life cycle delay attack, two-way full life cycle delay attack, and one-way non-full-life cycle delay attack.Stealthier delay attacks could be realized by the attack models under the premise that target nodes were not captured.Secondly, considering the problem that existing detection algorithms are difficult to detect stealthier delay attacks without obvious changes in time features, an attack detection algorithm based on a Bayesian model was proposed that extracts four representative features, including transmission rate, transmission delay, transmission success rate and time synchronization interval.In addition, in order to ensure the accuracy of the attack detection and classification in the presence of noise interference, the noise model of wireless channel was introduced to the Bayesian feature information matrix.Experimental results show that the proposed algorithm can effectively detect three kinds of attacks in the presence of noise.…”
Get full text
Article -
218
Implementation of Simplified Data Encryption Standard on FPGA using VHDL
Published 2022-03-01“…The DES is replaced by a number of new cryptographical methods, which based on DES, like AES and 3DES. …”
Get full text
Article -
219
AllianceBlockchain in the Governance Innovation of Internet Hospitals
Published 2024-12-01“…These results demonstrate the capability of alliance blockchain and cryptographic upgrades in creating safe and efficient governance frameworks for Internet hospitals.…”
Get full text
Article -
220
A Secure Framework for Privacy-Preserving Analytics in Healthcare Records Using Zero-Knowledge Proofs and Blockchain in Multi-Tenant Cloud Environments
Published 2025-01-01“…This paper presents a secure framework that addresses these concerns by integrating privacy-preserving parameters, zero-knowledge proofs (zk-SNARKs), blockchain technology, and a multi-tenant cloud environment. Through advanced cryptographic techniques, specifically zk-SNARKs, the framework ensures that healthcare records remain protected during analytics computations, without exposing raw data. …”
Get full text
Article