247 research outputs found
An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States
Two quantum key agreement protocols using Bell states and Bell measurement
were recently proposed by Shukla et al.(Quantum Inf. Process. 13(11),
2391-2405, 2014). However, Zhu et al. pointed out that there are some security
flaws and proposed an improved version (Quantum Inf. Process. 14(11),
4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still
exists some security problems, and its efficiency is not high enough. For
solving these problems, we utilize four Pauli operations {I, Z, X, Y } to
encode two bits instead of the original two operations {I,X} to encode one bit,
and then propose an efficient and secure arbitrary N-party quantum key
agreement protocol. In the protocol, the channel checking with decoy single
photons is introduced to avoid the eavesdropper's flip attack, and a
post-measurement mechanism is used to prevent against the collusion attack. The
security analysis shows the present protocol can guarantee the correctness,
security, privacy and fairness of quantum key agreement.Comment: 13 pages, 5 figure
A Practical Framework for Storing and Searching Encrypted Data on Cloud Storage
Security has become a significant concern with the increased popularity of
cloud storage services. It comes with the vulnerability of being accessed by
third parties. Security is one of the major hurdles in the cloud server for the
user when the user data that reside in local storage is outsourced to the
cloud. It has given rise to security concerns involved in data confidentiality
even after the deletion of data from cloud storage. Though, it raises a serious
problem when the encrypted data needs to be shared with more people than the
data owner initially designated. However, searching on encrypted data is a
fundamental issue in cloud storage. The method of searching over encrypted data
represents a significant challenge in the cloud.
Searchable encryption allows a cloud server to conduct a search over
encrypted data on behalf of the data users without learning the underlying
plaintexts. While many academic SE schemes show provable security, they usually
expose some query information, making them less practical, weak in usability,
and challenging to deploy. Also, sharing encrypted data with other authorized
users must provide each document's secret key. However, this way has many
limitations due to the difficulty of key management and distribution.
We have designed the system using the existing cryptographic approaches,
ensuring the search on encrypted data over the cloud. The primary focus of our
proposed model is to ensure user privacy and security through a less
computationally intensive, user-friendly system with a trusted third party
entity. To demonstrate our proposed model, we have implemented a web
application called CryptoSearch as an overlay system on top of a well-known
cloud storage domain. It exhibits secure search on encrypted data with no
compromise to the user-friendliness and the scheme's functional performance in
real-world applications.Comment: 146 Pages, Master's Thesis, 6 Chapters, 96 Figures, 11 Table
- …