Results 11 to 20 of about 27,441 (278)

Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud

open access: yesIEEE Access, 2019
He et al. proposed a certificateless provable data possession protocol for big data storage on cloud. They claimed that the scheme is not only secure, but also can achieve data integrity checking without downloading the stored data from the cloud server.
Yongjian Liao   +3 more
doaj   +3 more sources

A Provable Secure Session Key Distribution Protocol Based on NSSK for In-Vehicle CAN Network

open access: yesMathematics, 2022
Many CAN-based session key sharing approaches are based on the group key scheme, which can easily lead advanced adversaries to infiltrate all ECUs (electronic control units) in the network if the sharing key is leaked.
Long Yin, Jian Xu, Zihao Wang, Chen Wang
doaj   +1 more source

Secure Two-Party Computation over a Z-Channel [PDF]

open access: yes, 2011
In secure two-party computation, two mutually distrusting parties are interested in jointly computing a function, while preserving the privacy of their respective inputs.
Palmieri, Paolo   +2 more
core   +2 more sources

Provable Secure Parallel Gadgets

open access: yesIACR Transactions on Cryptographic Hardware and Embedded Systems, 2023
Side-channel attacks are a fundamental threat to the security of cryptographic implementations. One of the most prominent countermeasures against side-channel attacks is masking, where each intermediate value of the computation is secret shared, thereby concealing the computation’s sensitive information.
Francesco Berti   +2 more
openaire   +2 more sources

Provably Quantum-Secure Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Recent results on quantum cryptanalysis show that some symmetric key schemes can be broken in polynomial time even if they are proven to be secure in the classical setting.
Akinori Hosoyamada, Tetsu Iwata
doaj   +1 more source

Practical and Provably Secure Distance-Bounding [PDF]

open access: yesJournal of Computer Security, 2015
AbstractFrom contactless payments to remote car unlocking, many applications are vulnerable to relay attacks. Distance bounding protocols are the main practical countermeasure against these attacks. In this paper, we present a formal analysis of SKI, which recently emerged as the first family of lightweight and provably secure distance bounding ...
Boureanu, Ioana   +2 more
openaire   +3 more sources

Provable security against generic attacks on stream ciphers

open access: yesJournal of Mathematical Cryptology, 2023
Recent lightweight hardware-based stream cipher designs keep an external non-volatile internal state that is not part of the cipher’s hardware module. The purpose of these so-called small-state ciphers is to keep the size of the hardware and the power ...
Moch Alexander
doaj   +1 more source

Robustness of the BB84 quantum key distribution protocol against general coherent attacks [PDF]

open access: yes, 2005
It is demonstrated that for the entanglement-based version of the Bennett-Brassard (BB84) quantum key distribution protocol, Alice and Bob share provable entanglement if and only if the estimated qubit error rate is below 25% or above 75%. In view of the
Alber, G, Khalique, A, Nikolopoulos, G M
core   +2 more sources

Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures [PDF]

open access: yes, 2006
Content-Based Publish/Subscribe (CBPS) is an interaction model where the interests of subscribers are stored in a content-based forwarding infrastructure to guide routing of notifications to interested parties.
Raiciu, C, Rosenblum, DS
core   +1 more source

PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions [PDF]

open access: yes, 2013
Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions.
Chen, Zhili   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy