In 1998, Blaze, Bleumer and Strauss proposed new kind of cryptographic primitives called proxy re-encryption and proxy re-signature. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice'...
详细信息
In 1998, Blaze, Bleumer and Strauss proposed new kind of cryptographic primitives called proxy re-encryption and proxy re-signature. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice's public key into one that can be opened under Bob's decryption key. In proxy re-signature, a proxy can transform a signature computed underAlice's secret key into one that can be verified by Bob's public *** re-cryptography can find many interesting applications in our life. In this paper, we introduce a new attack- DDos attack against proxy in the proxy re-cryptography. Although this attack can also be implemented against other cryptographic primitives,the danger caused by it in proxy re-cryptography seems more *** revisit the current literature, paying attention on their resisting DDos attack ability. We suggest a solution to decline the impact of DDos attacking. Also we give two new efficient proxy re-encryption schemes which can achieve CCA2 secure based on Cramer-Shoup encryption scheme and prove its security. At last we give our conclusions with hoping researchers to pay more attention to this attack.
Attribute based encryption has become an active topic within the last few years, which can be regarded as a special identity based encryption integrated with flexible access structure. In this paper, we extend the con...
详细信息
Attribute based encryption has become an active topic within the last few years, which can be regarded as a special identity based encryption integrated with flexible access structure. In this paper, we extend the concept of key encapsulation mechanisms to the attribute-based setting and proposed a key-policy attribute based key encapsulation scheme. The proposed scheme is proved to be IND-CCA2 secure in the standard model under Decisional Bilinear Diffie- Hellman assumption.
The increase of the business and management complexity requires more adaptive and higher selfmanaged equipments, application processes and management systems, which promotes the development of autonomic computing and ...
详细信息
ISBN:
(纸本)9781615676606
The increase of the business and management complexity requires more adaptive and higher selfmanaged equipments, application processes and management systems, which promotes the development of autonomic computing and communication networks. The meteorological and hydrological business system (MHBS) is a typical composite functional system, which includes data collecting, transporting, convergence and clean up, distributing and publishing, pre-processing, storage, and weather forecasting. In order to realize self-management of MHBS, autonomic concept is introduced and autonomic network management architecture with associated model is proposed firstly. According to the measured data from observation and / or detection devices, the system may perceive the work situations of these devices by means of prediction models. Driven by a set of system management polices, some well-defined events can be processed, which enable generating configuration and adjustment suggestions automatically. The instances of policy-driven data communication management with multiple channels are given literally to show the model's mechanisms.
To be effective to retain customers and enhance the marketing capabilities, it is necessary to improve the personalization of e-commerce systems. Clustering is a reliable and efficient technology to provide personal s...
详细信息
This article presents the formal definition and description of popular topics on the Internet,analyzes the relationship between popular words and topics,and finally introduces a method that uses statistics and correla...
详细信息
This article presents the formal definition and description of popular topics on the Internet,analyzes the relationship between popular words and topics,and finally introduces a method that uses statistics and correlation of the popular words in traffic content and network flow characteristics as input for extracting popular topics on the *** on this,this article adapts a clustering algorithm to extract popular topics and gives formalized *** test results show that this method has an accuracy of 16.7%in extracting popular topics on the *** with web mining and topic detection and tracking(TDT),it can provide a more suitable data source for effective recovery of Internet public opinions.
Wireless sensor networks (WSN) are affected by underlying environments in which sensors are deployed randomly. Inevitably, there are many irregular holes in a WSN because of the existence of obstacles or the death of ...
详细信息
Wireless sensor networks (WSN) are affected by underlying environments in which sensors are deployed randomly. Inevitably, there are many irregular holes in a WSN because of the existence of obstacles or the death of some sensors. To detect these holes is of great importance to both WSN applications and networking functionalities. Holes are described by a set of sensor nodes on their boundaries. In this paper, we study the problem of identifying boundaries of holes in a WSN. By extracting hidden geometric features in the topology of a WSN, we are able to recognize sensor nodes on both inner and outer boundaries of holes. Methods proposed in this paper relies on neither the knowledge of localization nor the unit-disk communication model. We also propose a distributed algorithm to discover holes and identify nodes on boundaries. Simulation results show that our method works well for WSNs with many inner holes and irregular outer boundaries.
The Binary-based attestation (BA) mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system. However, BA only supports ...
详细信息
The Binary-based attestation (BA) mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system. However, BA only supports the attestation for specific patterns of binary codes defined by a trusted party, mostly the software vendor, for a particular version of a software. In this paper, we present a Source-Code Oriented Attestation (SCOA) framework to enable custom built application to be attested to in the TCG attestation architecture. In SCOA, security attributes are bond with the source codes of an application instead of its binaries codes. With a proof chain generated by a Trusted Building System to record the building procedure, the challengers can determine whether the binary interacted with is genuinely built from a particular set of source codes. Moreover, with the security attribute certificates assigned to the source codes, they can determine the trustworthiness of the binary. In this paper, we present a TBS implementation with virtualization.
Shamir proposed the first (t, n) threshold secret sharing scheme. Shamir's scheme is ideal and perfect. In this paper, we propose two modifications of Shamir's secret sharing scheme. In our first modification,...
详细信息
ISBN:
(纸本)9780769537443
Shamir proposed the first (t, n) threshold secret sharing scheme. Shamir's scheme is ideal and perfect. In this paper, we propose two modifications of Shamir's secret sharing scheme. In our first modification, each shareholder keeps both x-coordinate and y-coordinate of a polynomial as private share. In our second modification, dealer uses polynomial with degree larger than the threshold value t to generate shares for a (t, n) threshold scheme. We show that these two modified schemes are ideal and perfect. Using these two modifications, we design a multilevel threshold secret sharing schemes (MTSS). We prove that the proposed scheme is secure.
Delay tolerant networking (DTN) is a new store-and-forward architecture and protocol suite for the networks which is intermittent connectivity. Depending on the nodes ability of store and forward, the messages are del...
详细信息
Delay tolerant networking (DTN) is a new store-and-forward architecture and protocol suite for the networks which is intermittent connectivity. Depending on the nodes ability of store and forward, the messages are delivered to their destination with the proper choice of routing protocol by nodes' mobility. In order to successful delivery, many routing protocols use multiply copies methods. Although the messages are transferred to the destination, the redundant of messages copies increase much. These routing protocols are not appropriate for energyconstrained and bandwidth-constrained applications such as the wireless networks. In many resource-constrained mobile wireless DTN networks, single copy routing schemes should be used suitably. This paper presents a new routing scheme of single-copy based on the DTN connectivity graph and the corresponding greedy tree. The nodes choose the next intermediate node to transmit the message by comparing the location of nodes in the greedy tree. We show that delivery ratio is increased significantly by using our scheme in the single-copy routing.
作者:
Daofeng LiLize GuBin SunXinxin NiuYixian YangInformation Security Center
State Key Laboratory of Networking and Switching Technology Key Laboratory of network and information attack & defense technology of MOE National Engineering Laboratory for Disaster Backup and RecoveryBeijing University of Po
Router has acted as more and more important role in the large-scale network. In the meantime, the security of the router become more seriously. In this paper, we propose a new algorithm to decide a credential routing ...
详细信息
Router has acted as more and more important role in the large-scale network. In the meantime, the security of the router become more seriously. In this paper, we propose a new algorithm to decide a credential routing path from the start router to the end one based on the trust theory that considers the trustworthy of link, the cost of link and the trustworthy of router as the critical factors so as to utilize the principle of the grey correlation degree to obtain a credential routing path, instead of weighted mean in existed methods of trust measurement. We guarantee that packet can secure transfer under the credential routing path and identify the remote routers that are subject to attacks.
暂无评论