31 research outputs found

    Universal Forgery on Shen et al.âs Linkable and Convertible ID-based Ring Signature Scheme

    Get PDF

    Cloud Data Auditing Using Proofs of Retrievability

    Full text link
    Cloud servers offer data outsourcing facility to their clients. A client outsources her data without having any copy at her end. Therefore, she needs a guarantee that her data are not modified by the server which may be malicious. Data auditing is performed on the outsourced data to resolve this issue. Moreover, the client may want all her data to be stored untampered. In this chapter, we describe proofs of retrievability (POR) that convince the client about the integrity of all her data.Comment: A version has been published as a book chapter in Guide to Security Assurance for Cloud Computing (Springer International Publishing Switzerland 2015

    On the difficult tradeoff between security and privacy: Challenges for the management of digital identities

    Full text link
    The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-19713-5_39The deployment of security measures can lead in many occasions to an infringement of users’ privacy. Indeed, nowadays we have many examples about surveillance programs or personal data breaches in online service providers. In order to avoid the latter problem, we need to establish security measures that do not involve a violation of privacy rights. In this communication we discuss the main challenges when conciliating information security and users’ privacy.This work was supported by Comunidad de Madrid (Spain) under the project S2013/ICE-3095-CM (CIBERDINE)

    Separable and anonymous identity-based key issuing

    Get PDF
    In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is responsible for computing and sending the private keys to users and therefore, a secure channel is required. For privacy-oriented applications, it is important to keep in secret whether the private key corresponding to a certain identity has been requested. All of the existing ID-based key issuing schemes have not addressed this anonymity issue. Besides, the separation of duties of LRA and KGC has not been discussed as well. We propose a novel separable and anonymous ID-based key issuing scheme without secure channel. Our protocol supports the separation of duties between LRA and KGC. The private key computed by the KGC can be sent to the user in an encrypted form such that only the legitimate key requester authenticated by LRA can decrypt it, and any eavesdropper cannot know the identity corresponding to the secret key. © 2005 IEEE.published_or_final_versio

    Non-conventional digital signatures and their implementations – A review

    Full text link
    The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-19713-5_36The current technological scenario determines a profileration of trust domains, which are usually defined by validating the digital identity linked to each user. This validation entails critical assumptions about the way users’ privacy is handled, and this calls for new methods to construct and treat digital identities. Considering cryptography, identity management has been constructed and managed through conventional digital signatures. Nowadays, new types of digital signatures are required, and this transition should be guided by rigorous evaluation of the theoretical basis, but also by the selection of properly verified software means. This latter point is the core of this paper. We analyse the main non-conventional digital signatures that could endorse an adequate tradeoff betweeen security and privacy. This discussion is focused on practical software solutions that are already implemented and available online. The goal is to help security system designers to discern identity management functionalities through standard cryptographic software libraries.This work was supported by Comunidad de Madrid (Spain) under the project S2013/ICE-3095-CM (CIBERDINE) and the Spanish Government project TIN2010-19607

    TRANSPARENT SECURITY OF PRODUCTIVE RELIABLE AND UNAUTHORIZED DATA SHARING

    Get PDF
    Because of its liability, picture shingle is continually correlated inside a belligerent locale and be subjected to quite a few threats of pact. Shackles of information was don't hold your breath been clear-cut using the improvements of distort computing, and a precise investigation on mutual experiments enjoin be offering many benefits to the institute. In our responsibility we start a recent perception of deliver safeguard Identity-primarily based pull trademark, that is indispensable utensil in behalf of structures Onate profitable tried-and-true in addition secret arrangement of knowledge atinkle. The arrangement allows a theory of equality primarily based bang autograph blueprint to consist of express redemption and may be the primo in literature to smother this selection in behalf of jangle mark in identification based mostly stage setting. In our take we move up contract of integrity primarily based bang mark using foundation of assist aegis. The address solid Identity-based mostly clang autograph is a likeness primarily based location and during this manner, withdrawal of pricey certificate certification practice catch on safe and befitting for interpretation of massive evidence

    CONTROL-CURRENT ACCURATE AND SECRET TRUTHS ALLOCATION WITH ADVANCING SAFETY

    Get PDF
    Due to its openness, data speaking about is continually organized within the hostile setting and uncovered to numerous challenges of security. Speaking about of understanding wasn't have you been simple while using the advancements of cloud computing, along with an exact analysis on shared data provides you with several strengths for that society. Within our work we commence a manuscript idea of forward secure Identity-based ring signature, that's necessary tool for structuring cost-effective reliable furthermore to anonymous system of understanding speaking about. The unit permits an idea of identity based ring signature plan to incorporate forward security the initial in literature to contain this selection for ring signature in identity based setting. Within our work we advance security of identity based ring signature by way of provision of forward security. The forward guaranteed Identity-based ring signature is definitely an name based setting plus this process, removal of pricey certificate verification procedure can make it reliable and suitable for analysis of massive data

    Group-oriented ring signature

    Get PDF
    In this paper, we present an improved Rivest\u27s ring signature scheme. In our scheme, the size of the signature is only related to the ring members, and the signer needs no to publish amount of random numbers. On this basis, we propose a group-oriented ring signature. In this scheme, only the person who belongs to the designated group can verify the validity of the ring signature. The security of these two schemes can be proved by using Forking Lemmas
    corecore