354 research outputs found
A Formal Security Design Approach for Transformation of Authorizations in Information Systems
Efficient TTP-free mental poker protocols
Zhao et al proposed an efficient mental poker protocol which did not require using a Trusted Third Party(TTP). The protocol is efficient and suitable for any number of players but it introduces a security flaw. In this paper, we propose two mental poker protocols based on Zhao\u27s previous work. The security flaw has been removed and the additional computing cost is small
Security Challenges when Space Merges with Cyberspace
Spaceborne systems, such as communication satellites, sensory, surveillance,
GPS and a multitude of other functionalities, form an integral part of global
ICT cyberinfrastructures. However, a focussed discourse highlighting the
distinctive threats landscape of these spaceborne assets is conspicuous by its
absence. This position paper specifically considers the interplay of Space and
Cyberspace to highlight security challenges that warrant dedicated attention in
securing these complex infrastructures. The opinion piece additionally adds
summary opinions on (a) emerging technology trends and (b) advocacy on
technological and policy issues needed to support security responsiveness and
mitigation
Efficient TTP-free mental poker protocols
Zhao et al proposed an efficient mental poker protocol which did not require using a trusted third party (TTP). The protocol is efficient and suitable for any number of players but it introduces a security flaw. In this paper, we propose two mental poker protocols based on Zhao's previous work. The security flaw has been removed and the additional computing cost is small.6 page(s
Privacy-Preserving Mutual Authentication in RFID with Designated Readers
We study privacy-preserving mutual authentication in radio-frequency identification systems with designated readers (PP-MADR in short). In PP-MADR, each tag has its designated-reader group instead of all readers, and only tags and their designated readers can authenticate each other. Other readers and adversaries cannot trace tags or know their designated readers. The most challenging task of constructing such a PP-MADR protocol is the verification of reader designation without compromising tag privacy. We found that traditional solutions are impractical due to linear storage growth on tags, linear computation growth on tags, or requiring new key generations for designated readers. In this paper, we show how to construct such an efficient PP-MADR protocol. In our protocol, each tag stores constant-size secret state and performs constant-time computation for mutual authentication. When a tag is created, the server does not generate new private keys for designated readers. Our protocol captures the strong privacy property, where tags cannot be traced and designated readers cannot be distinguished, even if tags are corrupted by adversaries
- …