238,774 research outputs found

    On the Security of a Practical Identification Scheme

    Full text link

    A new idea in zero knowledge protocols based on iterated function systems

    Get PDF
    A secure method of identification is crucial to avoid computer deception dynamics. This could be attained by using zero-knowledge protocols. Zero-knowledge protocols are cryptographic protocols that have been proven to provide secure entity authentication without revealing any knowledge to any entity or to any eavesdropper and used to build effective communication tools and ensure their privacy. Many schemes have been proposed since 1984. Among them are those that rely on factoring and discrete log which are practical schemes based on NP- hard problems. Our aim is to provide techniques and tools which may be useful towards developing those systems. Fractal code was proven as a NP-hard problem, which means it cannot be solved in a practical amount of time. In this paper a new zero-knowledge scheme is proposed based on iterated function systems and the fractal features are used to improve this system. The proposed scheme is a generalization of the Guillou-Quisquater identification scheme. The two schemes are implemented and compared to prove their efficiency and security. From the implementation results, we conclude that zero knowledge systems based on IFS transformation perform more efficiently than GQ system in terms of key size and key space

    A business model for a sensors-enabled IMS environment

    Get PDF
    The IP Multimedia Subsystem (IMS) is one of the key components of third generation (3G) networks, while Wireless Sensor Networks (WSNs) are an emerging type of networks formed by a set of distributed sensor nodes that collaborate to monitor physical and environmental conditions. By integrating the sensing capabilities of WSNs in the IMS, a rich set of contextual information can be exploited to provide new and personalized multimedia services to IMS users. We have previously proposed a presence-based WSNs/IMS integration architecture, and discussed its design and implementation aspects. In this paper, we focus on the aspects needed for the practical deployment of this architecture. An enhanced IMS business model is proposed for the resulting sensors-enabled IMS environment, and several important support functions are elaborated, including: a two-level identification scheme, a charging model, security and information access control mechanisms, as well as WSN gateways\u27 dynamic discovery alternatives. © 2012 IEEE

    Ubic: Bridging the gap between digital cryptography and the physical world

    Full text link
    Advances in computing technology increasingly blur the boundary between the digital domain and the physical world. Although the research community has developed a large number of cryptographic primitives and has demonstrated their usability in all-digital communication, many of them have not yet made their way into the real world due to usability aspects. We aim to make another step towards a tighter integration of digital cryptography into real world interactions. We describe Ubic, a framework that allows users to bridge the gap between digital cryptography and the physical world. Ubic relies on head-mounted displays, like Google Glass, resource-friendly computer vision techniques as well as mathematically sound cryptographic primitives to provide users with better security and privacy guarantees. The framework covers key cryptographic primitives, such as secure identification, document verification using a novel secure physical document format, as well as content hiding. To make a contribution of practical value, we focused on making Ubic as simple, easily deployable, and user friendly as possible.Comment: In ESORICS 2014, volume 8712 of Lecture Notes in Computer Science, pp. 56-75, Wroclaw, Poland, September 7-11, 2014. Springer, Berlin, German
    corecore