A key pre-distribution scheme is a method by which initially an off-line trusted authority T A distributes pieces of information among a set of users. Later, each member of a group of users can compute a common key fo...
详细信息
A key pre-distribution scheme is a method by which initially an off-line trusted authority T A distributes pieces of information among a set of users. Later, each member of a group of users can compute a common key for secure communication. In this paper we present a keying Material Based key Pre-distribution Scheme, i.e., a group of users, using secret information preloaded in their memory and some public information retrieved from a keying material server, can compute a common key. We first formally define the keying material based key pre-distribution scheme in terms of the entropy, and give lower bounds on the amount of information each user has to keep secret. Then, we describe its applications for sensor networks.
MB1 is a very promising steganography. In this paper, a novel steganalysis scheme is presented to detect MB1. Many experiments are carried out based on high order features, and some useful propositions are learned fro...
详细信息
ISBN:
(纸本)9781424441969
MB1 is a very promising steganography. In this paper, a novel steganalysis scheme is presented to detect MB1. Many experiments are carried out based on high order features, and some useful propositions are learned from those experimental results. Based on those propositions we propose an effective MB1 detection algorithm. Experimental results show that the new proposed method has outperformed the existing MB1 steganalysis method in detection reliability.
The rapid development of trusted computing (TC) technology has become a milestone in the field of information security. There is an increasing application of trusted computing platform (TCP) with trusted computing sup...
详细信息
The rapid development of trusted computing (TC) technology has become a milestone in the field of information security. There is an increasing application of trusted computing platform (TCP) with trusted computing supporting software (TCSS) providing support for the trusted platform module (TPM) of TCP. There is an urgent need to test TCSS according to the specification of TC to ensure its quality. A promising approach to enhance the efficiency of the test process is evolutionary testing. This paper presents a test method of TCSS by using genetic algorithms-firstly making security function division of TCSS based on the common criteria (CC), then giving a model of evolutionary testing for TCSS, describing the concrete implementation of the testing prototype system, and finally testing a concrete TCSS product.
A new improved password authentication scheme is proposed, which is user anonymity, can fix the Hwang-Yeh's scheme and provide more other security properties such as server spoofing attacks, forge attacks, etc. Ac...
详细信息
A new improved password authentication scheme is proposed, which is user anonymity, can fix the Hwang-Yeh's scheme and provide more other security properties such as server spoofing attacks, forge attacks, etc. According to security properties comparisons among Peyravian-Zunic's scheme, Hwang-Yeh's scheme, Peyravian-Jeffries scheme, and our proposed scheme, the proposed scheme is more secure and practical over insecure network.
Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentica...
详细信息
Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentication by binding identity to messages and the signature, which fails to characterize the special security requirements of anonymous authentication with other kind of certificate. Therefore, inspired by the work of Marten, an anonymous hash certification ideal function and a more universal certificate CA model are proposed in this paper. We define the security requirements and security notions for this model in the framework of universal composable security and prove in the plain model (not in the random-oracle model) that these security notions can be achieved using combinations of a secure digital signature scheme, a symmetrical encryption mechanism, a family of pseudorandom functions, and a family of one-way collision-free hash functions. Considering the limitation of wireless environment and computation ability of wireless devices, this anonymous Hash certification ideal function is realized by using symmetry primitives.
At IMA-Crypto & Coding' 99, A. M. Barmawi et al. proposed a robust protocol for generating shared RSA parameters, which was claimed to be secure and robust from cheaters and malicious parties. In this paper, w...
详细信息
ISBN:
(纸本)9780863418365
At IMA-Crypto & Coding' 99, A. M. Barmawi et al. proposed a robust protocol for generating shared RSA parameters, which was claimed to be secure and robust from cheaters and malicious parties. In this paper, we propose a cryptanalysis of A. M. Barmawi's protocol and show that every valid participating party can recover the factorization of the RSA modulus N with the computational complexity O(log3N). Therefore, the secret RSA key parameters p, q, d are exposed to all the participating parties and A. M. Barmawi' s protocol is totally broken.
To enhance the quality of service (QoS) support in IEE 802.11, IEEE 802.11e has been studied, which introduces the so-called hybrid coordination function (HCF). HCF includes two medium access mechanisms: contention-ba...
详细信息
To enhance the quality of service (QoS) support in IEE 802.11, IEEE 802.11e has been studied, which introduces the so-called hybrid coordination function (HCF). HCF includes two medium access mechanisms: contention-based channel access (EDCA), and contention-free channel access (HCCA). Although IEEE 802.11e has provided differentiated channel access mechanism, when call demand rises for important festivals such as New Year's Day or large scale natural disasters such as earthquakes, the delay of voice will increase and the QoS of voice nodes will drop down rapidly. Through our simulation study, in order to guarantee the QoS of emergency voice calls in congested situation, a higher priority for these calls will be required.
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present ...
详细信息
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present an efficient constant-round group key exchange protocol, which is provably secure under the intractability of computation Diffie-Hellman problem. Our protocol is a contributory key exchange with perfect forward secrecy and has only two communication rounds. So it is more efficient than other protocols. Moreover, our protocol provides a method to design efficient constant-round group key exchange protocols and most secret sharing schemes could be adopted to construct our protocol.
Autonomic computing has received a great deal of attention from the research community in recent years. Many techniques have been proposed to monitor, analyze, and change the system under observation, but less attenti...
详细信息
In recent years, many pairing-based signcryption schemes have been proposed. There is, however, an inherent weakness in these schemes: the private key escrow problem, in which the "trusted" private key gener...
详细信息
In recent years, many pairing-based signcryption schemes have been proposed. There is, however, an inherent weakness in these schemes: the private key escrow problem, in which the "trusted" private key generator (PKG) can easily impersonate any user at any time without being detected. In this paper we present a pairing-based signcryption scheme using self-certified public keys. In our scheme, users can choose their private keys independently. The public keys of users can be implicitly verified with the subsequent signature verification in a logically single step. A trusted PKG is no longer required. If the dishonest PKG impersonates an honest user to communicate with others, the user can provide a proof of treachery of the PKG afterwards, which is similar to certificate-based systems.
暂无评论