Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








291 Hits in 1.9 sec

How to Hide the Real Receiver under the Cover Receiver: CP-ABE with Policy Deniability

Po-Wen Chi, Ming-Hung Wang, Hung Shiu
2020 IEEE Access  
In this work, we apply the deniability concept to solve this problem.  ...  Attribute-based encryption (ABE) is a useful tool for sharing an encrypted data to a target group.  ...  They further constructed a white-box traceable CP-ABE scheme with accountability in order to address the user key abuse and authorization center key abuse.  ... 
doi:10.1109/access.2020.2993688 fatcat:bnre3gs4l5hxnfdqvtbrsztkna

Hecate: Abuse Reporting in Secure Messengers with Sealed Sender [article]

Rawane Issa, Nicolas Alhaddad, Mayank Varia
2021 IACR Cryptology ePrint Archive  
Second, on top of AMF's accountability and deniability requirements, we also add forward and backward secrecy.  ...  End-to-end encryption provides strong privacy protections to billions of people, but it also complicates efforts to moderate content that can seriously harm people.  ...  Collision Resistance. Let π = {Gen, H} denote a hash function.  ... 
dblp:journals/iacr/IssaAV21 fatcat:bisd6kguure25makrsq7ki3gty

Privacy-Preserving Broker-ABE Scheme for Multiple Cloud-Assisted Cyber Physical Systems

Po-Wen Chi, Ming-Hung Wang
2019 Sensors  
In this scenario, attribute-based encryption (ABE) is an appropriate technique for securing data communication between sensors and clouds.  ...  Each cloud has its own attributes and a broker can determine which cloud is authorized to access data by the requirements set at the time of encryption.  ...  There are three associated requirements, collision resistance, semantic security and collision forgery, are listed below. Definition 4 (Collision Resistance).  ... 
doi:10.3390/s19245463 pmid:31835804 pmcid:PMC6960710 fatcat:uyhcysnrbjhdpmait25vv5ujmu

MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices [chapter]

Xingjie Yu, Bo Chen, Zhan Wang, Bing Chang, Wen Tao Zhu, Jiwu Jing
2014 Lecture Notes in Computer Science  
In this work, we present MobiHydra, a pragmatic plausibly deniable encryption (PDE) scheme featuring multi-level deniability on mobile devices, to circumvent the coercive attack.  ...  For instance, the data owner may be caught and coerced to give away the encryption keys so that the encryption alone is inadequate to mitigate such risk.  ...  The resistance against the booting-time attack is also featured in MobiHydra.  ... 
doi:10.1007/978-3-319-13257-0_36 fatcat:msllobydinf2tdeobfuosxbwoe

Simulation of Route Optimization with load balancing Using AntNet System

Ashish Kumar Sharma Ashish Kumar Sharma
2013 IOSR Journal of Computer Engineering  
The well known and widely used tamper-resistance RSA-Secured tokens [10] ).  ...  The well known and widely used tamper-resistance RSA-Secured tokens [10] ).  ...  IX CONCLUSION This method would help in encrypting the data individually though all the data belong to the same database. The common encryption format for a database can be totally eradicated.  ... 
doi:10.9790/0661-1140107 fatcat:cj275itmxndyvomoapvvho5v3e

Multi-party off-the-record messaging

Ian Goldberg, Berkant Ustaoğlu, Matthew D. Van Gundy, Hao Chen
2009 Proceedings of the 16th ACM conference on Computer and communications security - CCS '09  
For whistleblowers, informants, political dissidents and journalists -to name a few -it is most important to have means for deniable conversation, where electronic communication must mimic face-to-face  ...  In the following discussion, we abuse notation in that a single value M may be replaced by a tuple (x1, x2, . . .).  ...  For example Alice can pick a symmetric encryption key κ encrypt her message with κ, encrypt κ with Bob's public key and send everything to Bob.  ... 
doi:10.1145/1653662.1653705 dblp:conf/ccs/GoldbergUGC09 fatcat:s5sr2ax2kbfudcgq7y2u4gnah4

Deniable Key Exchanges for Secure Messaging

Nik Unger, Ian Goldberg
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
the deniability properties of the popular TextSecure secure messaging application.  ...  Deniable authenticated key exchanges (DAKEs), the cryptographic protocols responsible for providing deniability in secure messaging applications, cannot currently provide all desirable properties simultaneously  ...  We abuse notation by assuming that r $ ← − {0, 1} λ produces a random binary value with an appropriate length for the task at hand, with a security level controlled by λ.  ... 
doi:10.1145/2810103.2813616 dblp:conf/ccs/UngerG15 fatcat:i5crh7s75ffzzcn4mcdfv4ooca

A Cryptographic Analysis of OPACITY [chapter]

Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete
2013 Lecture Notes in Computer Science  
Thus, we investigate in how far the common security properties for authenticated key exchange and impersonation resistance, as well as privacy-related properties like untraceability and deniability, are  ...  Intuitively outsider deniability protects against the external abuse of transcripts between honest parties.  ...  There are different approaches and levels of deniability [9, 23, 24, 22, 28] ; in light of what OPACITY can achieve we focus on a very basic level protecting only against abuse of transcripts between  ... 
doi:10.1007/978-3-642-40203-6_20 fatcat:rbibehz2evgjncwexcr7mw4wga

Private Yet Abuse Resistant Open Publishing [chapter]

George Danezis, Ben Laurie
2010 Lecture Notes in Computer Science  
We present the problem of abusive, off-topic or repetitive postings on open publishing websites, and the difficulties associated with filtering them out.  ...  DISCUSSION First we need to discuss why this scheme provides resistance to abuse.  ...  Both of these assumption can be relaxed leading to more flexible, and re-usable abuse resistant publishing systems.  ... 
doi:10.1007/978-3-642-17773-6_28 fatcat:gr6cy7cqkvhixjd4rdgizji26i

The Steganographic File System [chapter]

Ross Anderson, Roger Needham, Adi Shamir
1998 Lecture Notes in Computer Science  
However, existing plausible deniability mechanisms, such as the one-time pad, are of rather limited scope. In this paper, we present the steganographic file system.  ...  Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported an element of plausible deniability  ...  There are some deniable encryption schemes in the literature (e.g. [5, 6, 11]) but these protocols can still generally protect only short messages, and are not applicable to storage.  ... 
doi:10.1007/3-540-49380-8_6 fatcat:yh7hl2ukubfmtbst2oxv2bzig4

Message in a bottle

Luca Invernizzi, Christopher Kruegel, Giovanni Vigna
2013 Proceedings of the 29th Annual Computer Security Applications Conference on - ACSAC '13  
We have introduced miab, a deniable protocol for censorship resistance that works with minimal requirements. miab can be used as a standalone communication system, or to bootstrap protocols that achieve  ...  Bob should be able to provide a fair service to its users by rate limiting blogs, and ban them when they exhibit abusive behavior.  ... 
doi:10.1145/2523649.2523654 dblp:conf/acsac/InvernizziKV13 fatcat:2o4kcwororgwpmdsudaq6j35hi

Efficient Public-Key Cryptography in the Presence of Key Leakage [chapter]

Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs
2010 Lecture Notes in Computer Science  
CCA-secure encryption.  ...  We study the design of cryptographic primitives resistant to a large class of side-channel attacks, called "memory attacks", where an attacker can repeatedly and adaptively learn information about the  ...  The signature-based AKA protocol is not deniable. However, we also construct a deniable AKA protocol based on our construction of leakage-flexible CCA-secure encryption.  ... 
doi:10.1007/978-3-642-17373-8_35 fatcat:hukm365jfvhmxabgvnja3p6dgy

Certificateless Deniable Authenticated Encryption for Location-based Privacy Protection

Guanhua Chen, Jianyang Zhao, Ying Jin, Quanyin Zhu, Chunhua Jin, Jinsong Shan, Hui Zong
2019 IEEE Access  
Deniable authenticated encryption (DAE) is a cryptographic primitive that supports data confidentiality with deniable authentication in an efficient manner.  ...  INDEX TERMS Deniable authenticated encryption (DAE), certificateless cryptography, random oracle model, location-based services (LBSs).  ...  So deniable authentication can ensure the location privacy of users. A. RELATED WORKS Three related notions are introduced, CLC, hybrid encryption, and deniable authentication.  ... 
doi:10.1109/access.2019.2931056 fatcat:2qj5l5qinjgejmcrblsaas55xe

Giving Patients Access to Their Medical Records via the Internet: The PCASSO Experience

D. Masys
2002 JAMIA Journal of the American Medical Informatics Association  
"Public-deniable" includes informa-tion about conditions specifically addressed by state law, such as mental health, HIV/AIDS, abortion, adoption, sexually transmitted diseases, and substance abuse.  ...  Both physicians and patients gave PCAS-SO very high ratings on its safety, and the system has continually resisted attack.  ... 
doi:10.1197/jamia.m1005 pmid:11861633 pmcid:PMC344575 fatcat:qqyzvpnsy5cjvnfjczbojms4py

Improved group off-the-record messaging

Hong Liu, Eugene Y. Vasserman, Nicholas Hopper
2013 Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society - WPES '13  
GOTR resists network failure, colluding and independent malicious insiders, and provides efficient and flexible membership management.  ...  This prevents inside forgers who act individually and do not control message delivery, like average end-users, from abusing Ui's circle key.  ...  The repudiability of our scheme does not rely on the deniability of the entity authentication algorithm, and therefore circumvents the problems in real-world plausible deniability.  ... 
doi:10.1145/2517840.2517867 dblp:conf/wpes/LiuVH13 fatcat:paa6n5g52baahhixnhze6tk3fa
« Previous Showing results 1 — 15 out of 291 results