Results 11 to 20 of about 27,441 (278)
Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud
He et al. proposed a certificateless provable data possession protocol for big data storage on cloud. They claimed that the scheme is not only secure, but also can achieve data integrity checking without downloading the stored data from the cloud server.
Yongjian Liao +3 more
doaj +3 more sources
A Provable Secure Session Key Distribution Protocol Based on NSSK for In-Vehicle CAN Network
Many CAN-based session key sharing approaches are based on the group key scheme, which can easily lead advanced adversaries to infiltrate all ECUs (electronic control units) in the network if the sharing key is leaked.
Long Yin, Jian Xu, Zihao Wang, Chen Wang
doaj +1 more source
Secure Two-Party Computation over a Z-Channel [PDF]
In secure two-party computation, two mutually distrusting parties are interested in jointly computing a function, while preserving the privacy of their respective inputs.
Palmieri, Paolo +2 more
core +2 more sources
Provable Secure Parallel Gadgets
Side-channel attacks are a fundamental threat to the security of cryptographic implementations. One of the most prominent countermeasures against side-channel attacks is masking, where each intermediate value of the computation is secret shared, thereby concealing the computation’s sensitive information.
Francesco Berti +2 more
openaire +2 more sources
Provably Quantum-Secure Tweakable Block Ciphers
Recent results on quantum cryptanalysis show that some symmetric key schemes can be broken in polynomial time even if they are proven to be secure in the classical setting.
Akinori Hosoyamada, Tetsu Iwata
doaj +1 more source
Practical and Provably Secure Distance-Bounding [PDF]
AbstractFrom contactless payments to remote car unlocking, many applications are vulnerable to relay attacks. Distance bounding protocols are the main practical countermeasure against these attacks. In this paper, we present a formal analysis of SKI, which recently emerged as the first family of lightweight and provably secure distance bounding ...
Boureanu, Ioana +2 more
openaire +3 more sources
Provable security against generic attacks on stream ciphers
Recent lightweight hardware-based stream cipher designs keep an external non-volatile internal state that is not part of the cipher’s hardware module. The purpose of these so-called small-state ciphers is to keep the size of the hardware and the power ...
Moch Alexander
doaj +1 more source
Robustness of the BB84 quantum key distribution protocol against general coherent attacks [PDF]
It is demonstrated that for the entanglement-based version of the Bennett-Brassard (BB84) quantum key distribution protocol, Alice and Bob share provable entanglement if and only if the estimated qubit error rate is below 25% or above 75%. In view of the
Alber, G, Khalique, A, Nikolopoulos, G M
core +2 more sources
Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures [PDF]
Content-Based Publish/Subscribe (CBPS) is an interaction model where the interests of subscribers are stored in a content-based forwarding infrastructure to guide routing of notifications to interested parties.
Raiciu, C, Rosenblum, DS
core +1 more source
PS-TRUST: Provably Secure Solution for Truthful Double Spectrum Auctions [PDF]
Truthful spectrum auctions have been extensively studied in recent years. Truthfulness makes bidders bid their true valuations, simplifying greatly the analysis of auctions.
Chen, Zhili +6 more
core +1 more source

