We propose a new intruder deduction system with XOR named IDX. By introducing the concept of abstract XOR term and its operation rules, IDX is able to eliminate complex equational reasoning of XOR. Moreover, it reduce...
详细信息
Implementation performance and key randomness are two key issues for stream cipher systems. In this paper, a lightweight stream cipher with good randomness of key stream is firstly proposed. It utilizes a novel propos...
详细信息
The authentication key exchange protocol enables communication participants to authenticate each other and agree on the session key over an insecure public network. Recently, a three-party authentication key exchange ...
详细信息
The authentication key exchange protocol enables communication participants to authenticate each other and agree on the session key over an insecure public network. Recently, a three-party authentication key exchange protocol based on Elliptic curve cryptograph is proposed. In this paper, we improve the three-party encrypted key exchange protocol by bilinear maps. The proposed three-party authentication key exchange protocol is provable secure under Computational Diffie-Hellman assumptions in the standard model. Furthermore, the novel protocol is more efficient.
Recently, Jung et al. proposed a robust conditional privacy-preserving authentication protocol in vehicle ad-hoc networks. However, Jung et al.'s authentication protocol cannot provide unlinkage and mutual authent...
详细信息
Recently, Jung et al. proposed a robust conditional privacy-preserving authentication protocol in vehicle ad-hoc networks. However, Jung et al.'s authentication protocol cannot provide unlinkage and mutual authentication during the communications between the vehicles and the road-side infrastructure units. In this paper, we propose an improved privacy-preserving mutual authentication protocol for vehicle ad hoc networks by using secure identity-based group blind signature, the private encryption system and the public encryption system. The proposed privacy-preserving mutual authentication protocol for vehicle ad-hoc networks satisfies mutual authentication, anonymity and unlinkability under Random Oracle Model and the Decisional Bilinear Diffie-Hellman (DBDH) assumption. In addition, the trusted center can trace malicious on-board units or road-Side infrastructure units in our protocol.
A software cloud is ready-made for software delivery or Software as a Service (SaaS). As it becomes more and more popular, security problems of software running in the cloud also become an important issue. The threats...
详细信息
As an emerging technology and business paradigm, Cloud Computing has taken commercial computing by storm. Cloud computing platforms provide easy access to a company's high-performance computing and storage infrast...
详细信息
Recently, Yang et al. proposed a three-party encrypted key exchange protocol (3PAKE) which is based on Elliptic curve cryptography. Their 3PAKE protocol is efficient because it requires less computation cost and less ...
详细信息
Software as a Service (SaaS) is a newly emerging business model in the software industry. The growing speed of SaaS is fast. The article gives a quick survey on SaaS. It covers key technologies in SaaS, difference bet...
详细信息
As public key cryptographic operations are computationally expensive;it motivates a careful examination of the reasons of its usage and looking for symmetric key alternatives. In this paper, we present comparisons bet...
详细信息
ISBN:
(纸本)9781424472352
As public key cryptographic operations are computationally expensive;it motivates a careful examination of the reasons of its usage and looking for symmetric key alternatives. In this paper, we present comparisons between public key and symmetric key cryptography in protecting storage and take some other factors, such as security, cost and environment etc. into consideration. At first, the comparisons between public key and symmetric key cryptography is presented. Then, the security services that some famous storage systems provide and some symmetric key alternatives are discussed. We give the comparisons of some practice storage systems and trade off some other parameters. Finally, some general conclusions are made about the secure storage systems for system designers.
Remote user authentication always adopts the method of password to login the server within insecure network environments. Recently, Peyravin and Jeffries proposed a practical authentication scheme based on one-way col...
详细信息
暂无评论