6 research outputs found
A Secured Agent-based Model for a Peer-to-Peer System
In this paper, information exchange that is devoid of control in the peer-to-peer communication, exposes peer to malicious activities, insecure communication, loss of significant data or failure of the system. The complexity and perceived compromise in peers communicating at different levels necessitates modeling a secured agent-based model for a peer-to-peer system. This work was designed to accommodate peer registration phase that will allow peers on satisfying defined requirement, request for connection to the super peer, subsequently guaranteeing and promoting healthy system. The agent module in the network ascertains successfully connected peers on the network, certifying feedback agent goal and ready for peer communication. The result shows that peculiar security attacks from malicious and un-registered peers are systematically controlled in the peer-to-peer system. Key words : Peer-to-peer, Agent-based, Secured and Communication. DOI: 10.7176/CEIS/12-2-03 Publication date: May30th 202
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme
Signcryption is a cryptographic primitive that provides authentication and confidentiality simultaneously in a single logical step. It is often required that multiple senders have to signcrypt a single message to a certain receiver. Obviously, it is inefficient to signcrypt the messages separately. An efficient alternative is to go for multi-signcryption. The concept of multi-signcryption is similar to that of multi-signatures with the added property - confidentiality. Recently, Jianhong et al. proposed an identity based multi-signcryption scheme. They claimed that their scheme is secure against adaptive chosen ciphertext attack and it is existentially unforgeable. In this paper, we show that their scheme is not secure against chosen plaintext attack and is existentially forgeable, we also provide a fix for the scheme and prove formally that the improved scheme is secure against both adaptive chosen ciphertext attack and existential forgery