118 research outputs found
Security weakness of two authenticated key exchange protocols from pairings
Recently, Liu proposed two authenticated multiple key exchange protocols using pairings, and claimed two protocols featured many security attributes. In this paper, we show that Liu’s protocols are insecure. Both of Liu’s protocols cannot provide perfect forward secrecy
Security Weakness in Two Authenticated Key Exchange Protocols
In ICA3PP 2009, Xinglan Zhang proposed two one-round
authenticated key exchange protocols and proved their security
in the standard model. In this paper, we analyze these two
protocols and find that both of them exist some flaws
Ephemeral key compromise attack on the IB-KA protocol
Recently, Dario Fiore and Rosario Gennaro proposed the IB-KA protocol, which was inspired by MQV protocol. They provide a full
proof of security of IB-KA protocol using techniques developed by
Krawczyk in the Canetti-Krawczyk model. They designed the IB-KA
protocol with some security properties such as perfect forward
secrecy, reflection attack resilience, and key compromise impersonation resilience. But they didn\u27t consider ephemeral key
compromise problem in the design of IB-KA protocol, and made no
analysis whether the IB-KA protocol can resist ephemeral key
compromise attacks. In this paper, we present ephemeral key
compromise attack on the the IB-KA protocol. Our work shows that the
IB-KA protocol is designed without ephemeral key compromise
resilience
A modified eCK model with stronger security for tripartite authenticated key exchange
Since Bellare and Rogaway presented the first formal security model
for authenticated key exchange (AKE) protocols in 1993, many formal
security models have been proposed. The extended Canetti-Krawczyk
(eCK) model proposed by LaMacchia et al. is currently regarded as
the strongest security model for two-party AKE protocols. In this
paper, we first generalize the eCK model for tripartite AKE
protocols, called teCK model, and enhance the security of the new
model by adding a new reveal query. In the teCK model, the adversary
has stronger powers, and can learn more secret information. Then we
present a new tripartite AKE protocol based on the NAXOS protocol,
called T-NAXOS protocol, and analyze its security in the teCK model
under the random oracle assumption
Improved Fault Attack Against Eta Pairing
Abstract In recent years, an increasing number of cryptographic protocols based on bilinear pairings have been developed. With the enhancement of implementation efficiency, the algorithms of pairings are usually embedded in identity aware devices such as smartcards. Although many fault attacks and countermeasures for public key and elliptic curve cryptographic systems are known, the security of pairing based cryptography against the fault attacks has not been studied extensively. In this paper, we present an improved fault attack against the Eta pairing and generalize the attack to general loop iteration. We show that whatever the position of the secret point is, it can be recovered through solving the non-linear system obtained after the fault attack
Shorter Decentralized Attribute-Based Encryption via Extended Dual System Groups
Decentralized attribute-based encryption (ABE) is a special form of multiauthority ABE systems, in which no central authority and global coordination are required other than creating the common reference parameters. In this paper, we propose a new decentralized ABE in prime-order groups by using extended dual system groups. We formulate some assumptions used to prove the security of our scheme. Our proposed scheme is fully secure under the standard k-Lin assumption in random oracle model and can support any monotone access structures. Compared with existing fully secure decentralized ABE systems, our construction has shorter ciphertexts and secret keys. Moreover, fast decryption is achieved in our system, in which ciphertexts can be decrypted with a constant number of pairings
HT2005-72602 MEASUREMENTS OF THERMOELECTRIC PROPERTIES OF BISMUTH TELLURIDE NANOWIRES
ABSTRACT Theoretical calculations have predicted that nanowire materials may have enhanced thermoelectric figure of merit compared to their bulk counterparts due to classical and quantum size effects. We have measured the thermoelectric properties of bismuth telluride nanowires deposited using an electrochemical deposition method in porous anodized alumina templates with the average pore size of about 60 nm. Transmission electron microscopy results of these nanowires showed that the nanowires were single crystalline with a composition of 54% Te and 46% Bi and the thickness of the surface oxide layer was in the range of 5-10 nm. The thermal conductance and Seebeck coefficient of the nanowires were measured using a microfabricated device that consists of two suspended membranes, across which the nanowire sample was placed. The obtained Seebeck coefficient of a bundle consisting of two 100 nm bismuth telluride nanowires increased with increasing temperature from 160 K to 360 K, and the room temperature value was 260 µV/K, which was 60% higher than the bulk value. The thermal conductance of the sample also increased with increasing temperature from 25 K to 360 K. Current design of the microdevice does not allow for fourprobe electrical resistance measurement of the nanowire. We have measured the four-probe electrical resistance of a 57 nm diameter and a 43 nm diameter bismuth telluride nanowires from the same template, and found that the room-temperature electrical conductivity of the nanowires was close to the bulk value and showed much weaker temperature dependence than bulk electrical conductivity
Dual functional states of working memory realized by memristor-based neural network
Working memory refers to the brain's ability to store and manipulate information for a short period. It is disputably considered to rely on two mechanisms: sustained neuronal firing, and “activity-silent” working memory. To develop a highly biologically plausible neuromorphic computing system, it is anticipated to physically realize working memory that corresponds to both of these mechanisms. In this study, we propose a memristor-based neural network to realize the sustained neural firing and activity-silent working memory, which are reflected as dual functional states within memory. Memristor-based synapses and two types of artificial neurons are designed for the Winner-Takes-All learning rule. During the cognitive task, state transformation between the “focused” state and the “unfocused” state of working memory is demonstrated. This work paves the way for further emulating the complex working memory functions with distinct neural activities in our brains
- …