10 research outputs found

    A simple tree pattern matching algorithm for code generator

    No full text

    An Efficient Threshold Signature Scheme Resistible to Conspiracy Attack

    No full text
    The study presents a threshold signature scheme. While developing threshold cryptography, the concept of threshold signature can accomplish a tradeoff between efficiency in use and dependability of security. The presented threshold signature scheme can resist conspiracy attack by controlling the right of issuing group signature, and the performance of constructing group signature is also enhanced by simplifying keys

    An Efficient Threshold Signature Scheme Resistible to Conspiracy Attack

    No full text
    The study presents a threshold signature scheme. While developing threshold cryptography, the concept of threshold signature can accomplish a tradeoff between efficiency in use and dependability of security. The presented threshold signature scheme can resist conspiracy attack by controlling the right of issuing group signature, and the performance of constructing group signature is also enhanced by simplifying keys

    Key Management Scheme for Controlling Access in Secure Authorization

    No full text
    With the rapid development of the Internet, on which many users start to take action in putting personal or corporate information and sharing them with everyone. The Internet is public as it were, if the limit of authority is not controlled to assure the security, it is possible that those attackers could illegally access to important information and destroy them. Not only is personal privacy invaded, but the mass properties are also damaged. Therefore, an effective access control system has been strongly emphasized in modern societies. To fight against these network attacks, it is necessary to establish an effective and secure access control system. Here, a scheme, a key management called Lagrange interpolation mainly takes an access control model as the framework, is proposed and Elliptic Curve Cryptography system is used for enhancing the security. The reason of choosing Lagrange interpolation is that the key used is randomized, no relationship between each key. With Elliptic Curve Cryptography system, it is expected to have attackers waste their time dealing with Elliptic Curve Discrete Logarithm Problem. Once the prime number is big enough, attackers will have trouble deciphering the key. An access control is comprehensive. For example, if the mobile agent technology is applied to an access control and key management, it would waste space and cause some flaws in the security.Moreover, there are still a lot of works to do on medical applications. Hence, these schemes are proposed for mobile agents in order to reach the improvement and then analyze the security and try to simulate what attackers will do. Four common attacks, namely External Collective Attack, Internal Attack, Collusion Attacks and Equation Breaking Attack are concluded. As results, attackers are hard to decipher the key because of no relationship between each key and will have to face Elliptic Curve Discrete Logarithm Problem. It is confirmed that the proposed schemes can be safer and more efficient in protecting mobile agents

    An Agent-Based Auction Protocol on Mobile Devices

    No full text
    This paper proposes an English auction protocol to preserve a secure, fair, and effective online auction environment, where the operations are integrated with mobile agent technology for bidders participating in online auctions. The protocol consists of four participants, namely, registration manager, agent house, auction house, and bidder

    Authenticated Key Agreement Scheme for Fog Computing in a Health-Care Environment

    No full text
    The application of the Internet of Things has been greatly expanded; meanwhile, real-time and efficient communication has become an important feature of the Internet of Things. However, the centralized characteristics of cloud computing cannot meet the needs of low latency and high computing efficiency. To solve these issues, we utilized fog computing which is a new distributed computing paradigm that extends cloud services to the edge of the network, with mobility and low latency. Nevertheless, fog computing also brings new security issues, especially identity authentication. Authentication and key exchange are significant challenges that need to be taken into consideration in fog computing. Therefore, in this research, we proposed the architecture of the mutual authentication key establishment scheme based on elliptic curve cryptography for fog computing. After mutual authentication, the cloud server can transfer the remaining verification work to fog nodes, and fog nodes will be responsible for authenticating the device and distributing the established session key, thereby reducing the computational cost of the cloud server. Moreover, to evaluate the security of the proposed scheme, we not only used the random oracle model and the extended Canetti-Krawczyk (eCK) threat model to conduct a detailed analysis, but also proved that the security of the proposed scheme is strong enough against several attacks

    Quality Control of Lead-Acid Battery according to Its Condition Test for UPS Supplier and Manufacturers

    No full text
    The risk of insufficient petroleum resources has forced human beings to emphasize the acquisition and storage of energy. To avoid such situation, this study tends to explore the effective management of lead-acid batteries for effective utilization conforming to the industrial requirements
    corecore