نتایج جستجو برای: malicious but passive key generation center attack

تعداد نتایج: 3071153  

Journal: :IACR Cryptology ePrint Archive 2007
Yong Ho Hwang Joseph K. Liu Sherman S. M. Chow

We introduce the first secure Certificateless Public Key Encryption (CL-PKE) scheme against a malicious Key Generation Center (KGC) in the standard model. Recently, Au et al. [3] pointed out that the previous security models for CL-PKE schemes cannot guarantee the security against a malicious KGC. They also showed that although some schemes are secure against malicious KGC, they require the ran...

Journal: :IACR Cryptology ePrint Archive 2010
Yang Lu

Certificate-based encryption (CBE) is a new asymmetric encryption paradigm which was introduced to solve the certificate management problem in traditional public key encryption (PKE). It combines PKE and identity-based encryption (IBE) while preserving some of their most attractive features. CBE provides an efficient implicit certificate mechanism which eliminates the third-party queries and si...

2015
Sanjeev Kumar Amandeep kaur

In the domain of network security, many technologies and tools have been used throughout the years to create and test systems of network intrusion detection system and to test the strengthen of computer security system. One of these is the honeypot. A honeypot appears as a normal part of the network but in actual way it is an isolated environment which monitors the malicious activities in a net...

2000
Wen-Guey Tzeng

When a group of people wants to communicate securely over an open network, they run a conference-key protocol to establish a common conference key K such that all their communications thereafter are encrypted with the key K. In this paper we propose a practical and provably secure fault-tolerant conference-key agreement protocol under the authenticated broadcast channel model. The adversary tha...

Journal: :I. J. Network Security 2016
Fushan Wei Yun Wei Chuangui Ma

An authenticated group key exchange (AGKE) protocol allows a group of participants to establish a common session key and then provides secure group communications in collaborative and distributed applications. Recently, Wu et al. proposed an ID-based authenticated group key exchange protocol based on bilinear pairings. They claimed that their protocol can detect and identify the malicious parti...

Journal: :IACR Cryptology ePrint Archive 2008
Zbigniew Golebiewski Krzysztof Majcher Filip Zagórski Marcin Zawada

HB and HB+ are a shared secret-key authentication protocols designed for low-cost devices such as RFID tags. HB+ was proposed by Juels and Weis at Crypto 2005. The security of the protocols relies on the learning parity with noise (LPN) problem, which was proven to be NP-hard. The best known attack on LPN by Levieil and Fouque [13] requires subexponential number of samples and sub-exponential n...

Journal: :CoRR 2013
Deepali Virmani Manas Hemrajani Shringarica Chandel

Security is a key feature in Wireless Sensor Networks but they are prone to many kinds of attacks and one of them is Black Hole Attack. In a black hole attack all the packets are consecutively dropped which leads to the decrease in the efficiency of the network and unnecessary wastage of battery life. In this paper, we propose an exponential trust based mechanism to detect the malicious node. I...

Journal: :Lecture Notes in Computer Science 2022

The SIDH key exchange is the main building block of SIKE, only isogeny based scheme involved in NIST standardization process. In 2016, Galbraith et al. presented an adaptive attack on SIDH. this attack, a malicious party manipulates torsion points his public order to recover honest party’s static secret key, when having access oracle. 2017, Petit designed passive (which was improved by de Quehe...

2006
Man Ho Au Jing Chen Joseph K. Liu Yi Mu Duncan S. Wong Guomin Yang

Identity-based cryptosystems have an inherent key escrow issue, that is, the Key Generation Center (KGC) always knows user secret key. Thus, if the KGC is malicious, it can always impersonate the user. Certificateless cryptography, introduced by Al-Riyami and Paterson in 2003, is intended to solve this problem. However, in all the previously proposed certificateless schemes, it is always assume...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید