Honeypot detection is a popular technology in the current cyber security, which can be used to check the disguise and protection level of deployed honeypots. To address the problem of low detection accuracy of existin...
详细信息
The safe and stable operation of power system is related to the national economy and people's livelihood of the whole country. Blackouts are almost always caused by cascading failures. This paper first analyzes th...
详细信息
With the development of Industrial 4.0, the popularity of information technology (IT) systems in industrial control systems (ICSs) has brought great cyber-attack risk. The proactive defense technology, an important de...
详细信息
We introduce the AT-GCN (Adaptive Threshold filtering Graph Convolutional Neural network model). AT-GCN is a recommendation model based on graph structure. Compared with the commonly used graph structure recommendatio...
详细信息
The high complexity of software and the diversity of security vulnerabilities have brought severe challenges to the research of software security vulnerabilities Traditional vulnerability mining methods are inefficien...
详细信息
Multi Variant eXecution (MVX) is a security defense technique that uses software diversity to protect system from attacks. MVX improves security capability by enhancing system endogenous security compared to tradition...
详细信息
Network data security is very important for each user and service provider, and every process of network data transmission is at risk of being tampered with. In this paper, we proposed a bidirectional tampering method...
详细信息
In order to compute the smallest eigenvalue and its corresponding eigenvector of a large-scale, real, and symmetric matrix, we propose a class of greedy randomized coordinate updating iteration methods based on the pr...
详细信息
In recent years, with the continuous development of machine learning and deep learning, their related applications have gradually appeared in our field of vision, showing explosive growth. A deep learning compiler opt...
详细信息
Multi-signature schemes have attracted considerable attention in recent years due to their popular applications in PoS blockchains. However, the use of general multi-signature schemes poses a critical threat to the se...
详细信息
ISBN:
(纸本)9781939133441
Multi-signature schemes have attracted considerable attention in recent years due to their popular applications in PoS blockchains. However, the use of general multi-signature schemes poses a critical threat to the security of PoS blockchains once signing keys get corrupted. That is, after an adversary obtains enough signing keys, it can break the immutable nature of PoS blockchains by forking the chain and modifying the history from some point in the past. Forward-secure multi-signature (FS-MS) schemes can overcome this issue by periodically updating signing keys. The only FS-MS construction currently available is Drijvers et al's Pixel, which builds on pairing groups and only achieves forward security at the time period level. In this work, we present new FS-MS constructions that either are free from pairing or capture forward security at the individual message level (i.e., fine-grained forward security). Our first construction Pixel+ works for a maximum number of time periods T. Pixel+ signatures consist of only one group element, and can be verified using two exponentiations. It is the first FS-MS from RSA assumption, and has 3.5x and 22.8x faster signing and verification than Pixel, respectively. Our second FS-MS construction Pixel++ is a pairing-based one. It immediately revokes the signing key's capacity of re-signing the message after creating a signature on this message, rather than at the end of the current time period. Thus, it provides more practical forward security than Pixel. On the other hand, Pixel++ is almost as efficient as Pixel in terms of signing and verification. Both Pixel+ and Pixel++ allow for non-interactive aggregation of signatures from independent signers and are proven to be secure in the random oracle model. In addition, they also support the aggregation of public keys, significantly reducing the storage overhead on PoS blockchains. We demonstrate how to integrate Pixel+ and Pixel++ into PoS blockchains. As a proof-of-concept, we prov
暂无评论