The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A new method of proxy re-encryption using rectangular integer matrices as the private keys is described. The technique uses modular arithmetic to limit the size of the elements of the key matrices and also to provide resistance to cryptanalysis attack.
Public key encryption scheme with keyword searchable (PEKS) enables one to search for encrypted keywords without compromising the confidentiality of the original data. A practical PEKS scheme should have the following properties: quickly and efficiently searchable method, ciphertext integrity, a small amount of decryption operation for user, and full security. However, there are seldom schemes that...
Needs for secret sharing scheme is increasing as demands for cloud services grow. However, secret sharing scheme possesses a drawback in that unauthorized users who can access storages storing partial information can reconstruct a secret. Password-Protected Secret Sharing (PPSS) was proposed in order to resolve such a drawback. PPSS is a secret sharing scheme that ensures only the owner of the secret...
In proxy re-encryption (PRE), a proxy with re-encryption keys can transfer aciphertext computed under Alice's public key into a new one, which can be decrypted by Bob only with his secret key. Recently, Wang et al. introduced the concept of PRE plus (PRE+) scheme, which can be seen as the dual of PRE, and is almost the same as PRE scheme except that the re-encryption keys are generated by the encrypter...
Multi-Authority Ciphertext-Policy Attribute-Based Encryption (MA-CP-ABE) is a rising cryptographic primitive for implementing fine-grained attribute-based access control on the outsourced data in cloud storage. However, most of the previous multi-authority attribute-based systems area unit either proved to be secure in a very weak model or lack of potency in user revocation. In this paper, we have...
We investigated different encryption algorithms for sport wearable devices by utilizing a newly developed data generator for the testing purposes. Additionally we investigated different data encryption algorithms for a NoSQL DBMS. Testing results for data generator, data encryption and NoSQL database stress testing are presented and discussed as well. The research project was conducted in support...
This paper investigates the biometric data emulation and encryption for the sports wearable devices, including data generation performance with different data encryptions for a NoSQL document database. We discuss more deeply a specific topic, related to testing data generation and data encryption for the performance and stress testing of our NoSQL database.
Cloud computing is the use of computing resources like hardware and software that are delivered as a service over a network. It confides remote services with a user's data and software, it enables a user to do large amount of storage, large amount of computations. Due to which data security in cloud becomes a big issues. Data access control provides the security of data in the cloud. The large amount...
In a hierarchical system, a set of users with ranked rights are organized in a tree-architecture, and the user with higher grade can search and access data of users with lower grade in its branch. Nowadays hierarchical systems are constructed by utilizing the cloud to improve their performance due to the cloud server's powerful computation and storage capabilities. However, the untrusted cloud server...
Consider a client who wants to outsource storage and computation of sensitive information to a not fully trusted third party. Secure computation algorithms like homomorphic encryption are typically used to solve this issue, but introduce overhead through randomization and thus ciphertext expansion. Furthermore, encryption may be infeasible for small, resource constrained devices.
Attribute-based encryption (ABE) is a type of public key encryption that allows users to encrypt and decrypt messages based on user attributes. One drawback is that encryption and decryption computational costs scale with the complexity of the access policy or number of attributes. In practice, this makes encryption and decryption a possible bottleneck for some applications. In this work, we aim to...
This paper presents a comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets through simulation. Mix-servers involved in a decryption mixnet receive independently and repeatedly encrypted messages as their input, then successively decrypt and shuffle them to generate a new altered output from which finally the messages are regained. Thus mixnets confirm unlinkability...
Recently, many kinds of cloud computing based services are provided and they are becoming more and more popular. But we think it is an urgent problem to improve the security of cloud services especially for storage services because the number of cyber-attacks is increasing. Currently, our research group proposed an image morphing based technology for improving the security of cloud services. This...
Key management schemes establish a shared secret key between all the members in the group. Key management in multicast dynamic groups, where users can leave or join at their ease is one of the most crucial and essential part of secure communication. We proposed a new decentralized group key management scheme using attribute based encryption which provide no single point of failure, scalability and...
Recent years witness the rapid development of cloud computing and more and more data owners outsource their data to the cloud. To eliminate the disclosure of authorized data users' privacy in cloud services (e.g., cloud storage or cloud-assisted computing)-since the cloud providers cannot be fully trustworthy-several previous works have proposed considerable privacy-preserving schemes by exploiting...
This paper discusses forward secrecy functionality, which has come into the spotlight due to a series of news reports regarding the NSA. SSL/TLS server support for forward secrecy was introduced at major sites such as SNS at the end of last year, so servers enabling forward secrecy are increasing. This paper shows SSL/TLS servers status survey about enabling forward secrecy by crawling with SSLyze...
Public key timed-release searchable encryption (PKTRSE) can be used to solve the time-dependent cipher text retrieval problem. In one to one PKTRSE, the sender transmits the encrypted message to the server and wants it to be searched and decrypted by the unique appointed receiver after the release time. When such PKTRSE is applied to encrypt a message for multiple recipients with the same release...
Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. Those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned by different users are stored in some cloud servers instead of under their own control. To deal with security problems, various schemes based on the Attribute-Based...
Proof of Retrievability (POR) and Provable Data Possession (PDP) systems these days are the most active area of research for data integrity check, which is outsourced to cloud service providers. In this work we surveyed data integrity proving schemes by reviewing different schemes in the area along with their efficiency and security considerations. The objective of this survey is to offer a state-of-the-art...
With the current rapid increase of cloud computing, enterprises outsource their sensitive data for sharing in a cloud. The key problems of this approach include establishing access control for the encrypted data, and revoking the access rights from users when they are no longer authorized to access the encrypted data on cloud servers. This paper aims to solve these problems. Firstly, based on the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.