Results 61 to 70 of about 95,997 (171)
Electronic cash system based on certificateless group signature
An efficient elliptic certificateless group signature ith forward security and member revocation based on ACJT group signature was proposed.Compared to ACJT which has complex computation,many parameters and long signature length,proposed scheme has less ...
Yan LIANG, Xiao ZHANG, Zhi-ming ZHENG
doaj
Forward Secure Non-Interactive Key Exchange [PDF]
Exposure of secret keys is a major concern when cryptographic protocols are implemented on weakly secure devices. Forward security is thus a way to mitigate damages when such an event occurs. In a forward-secure scheme, the public key is indeed fixed while the secret key is updated with a one-way process at regular time periods so that security of the ...
Pointcheval, David, Sanders, Olivier
openaire +2 more sources
Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT
In the cloud-assisted industrial Internet of Things (IIoT), since the cloud server is not always trusted, the leakage of data privacy becomes a critical problem. Dynamic symmetric searchable encryption (DSSE) allows for the secure retrieval of outsourced
Tianqi Peng +7 more
doaj +1 more source
The 5G-AKA protocol, a foundational component for 5G network authentication, has been found vulnerable to various security threats, including linkability attacks that compromise user privacy.
Yongho Ko +2 more
doaj +1 more source
Cryptanalysis of AES-PRF and Its Dual
A dedicated pseudorandom function (PRF) called AES-PRF was proposed by Mennink and Neves at FSE 2018 (ToSC 2017, Issue 3). AES-PRF is obtained from AES by using the output of the 5-th round as the feed-forward to the output state.
Patrick Derbez +6 more
doaj +1 more source
Discussion on the cultivation of cyber security talents
The competition in cyberspace is ultimately the competition of talents. Nowadays, countries around the world pay great attention to the training of cyber security talents.
WENG Jian, WEI Linfeng, ZHANG Yue
doaj +1 more source
Security Isolation Strategy Mechanism for Lightweight Virtualization Environment
For cloud service providers, lightweight virtualization is a more economical way of virtualization. While the user is worried about the safety of applications and data of the container, due to the container sharing the underlying interface and the kernel,
Liu Qian +3 more
doaj +1 more source
Analysis and improvement of an ID-based authenticated key agreement protocol
The security of a recently proposed ID-based authenticated key agreement protocol was analyzed. Although it is provably secure in the standard model, a malicious PKG (private key generator) can still obtain all of the agreed ses-sion keys, that is, it ...
WANG Xiao-fen1 +2 more
doaj +2 more sources
Forward-secure ciphertext-policy attribute-based encryption scheme
To mitigate the damage of key exposure in the context of ciphertext-policy attribute-based encryption (CP-ABE). The syntax and security model of forward-secure CP-ABE was presented. Then, a concreted forward-secure CP-ABE scheme was constructed.
EIJiang-hong W, IUWen-fen L, UXue-xian H
doaj +2 more sources
The frequent occurrence of network security incidents on wind farms seriously threatens the safety of power plants and power grids.The network security risk of power monitoring system on wind farms was analyzed from five aspects,including structure ...
Wei DING
doaj +2 more sources

