A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Online/Offline Provable Data Possession
2017
IEEE Transactions on Information Forensics and Security
Index Terms-Provable data possession, chameleon hash, online/offline signature, data outsourcing, cloud storage. ...
Provable data possession (PDP) allows a user to outsource data with a guarantee that the integrity can be efficiently verified. ...
Related Work 1) Provable Data Possession: Outsourced data in clouds confront many security threats [13] such as integrity and privacy. To tackle the integrity issue, Ateniese et al. ...
doi:10.1109/tifs.2017.2656461
fatcat:yfbi3kip6begxceqtr5jntki2a
New Online/Offline Signature Schemes Without Random Oracles
[chapter]
2006
Lecture Notes in Computer Science
Our proposals utilize Shamir-Tauman's generic construction for building EF-CMA secure online/offline signature schemes from trapdoor commitments and less secure basic signature schemes. ...
In this paper, we propose new signature schemes provably secure under the strong RSA assumption in the standard model. ...
Online/Offline Signature Schemes The notion of online/offline signatures was introduced by Even et al. [EGM96] . ...
doi:10.1007/11745853_22
fatcat:cwagbppkhzcs5h5sxpetaofxa4
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
[chapter]
2006
Lecture Notes in Computer Science
In this paper, we first introduce an efficient ID-based online/offline scheme for authentication in AODV and then provide a formal transformation to convert the scheme to an ID-based online/offline multisignature ...
Our scheme is unique, in the sense that a single ID-based online/offline signature scheme can be applied to both AODV and DSR routing protocols. ...
ID-based Online/Offline Signature Scheme Definition 3. ...
doi:10.1007/11780656_9
fatcat:ctxeigmhuvf2piusvk22q3c7li
R-OO-KASE: Revocable Online/Offline Key Aggregate Searchable Encryption
2020
Data Science and Engineering
Motivated with the goal to reduce the computational cost, in this paper, we propose a Revocable Online/Offline KASE (R-OO-KASE) scheme, based on the idea of splitting the encryption/decryption operations ...
The security analysis and empirical evaluations show that the proposed scheme is efficient to use in resource-constrained devices and provably secure as compared to the existing KASE schemes. ...
Online/Offline Decryption The cloud server sends
search results to the query requester. ...
doi:10.1007/s41019-020-00136-y
fatcat:x7sevlxkvnah3du7tb6khvnhde
IBOOST: A Lightweight Provably Secure Identity-based Online/Offline Signature Technique based on FCM for Massive Devices in 5G Wireless Sensor Networks
2021
IEEE Access
Thus, the transmission of personal data over these wireless channels needs to be supported by lightweight and provably secure online/offline identity-based signature techniques (IBS) [15] . ...
Chaosbased key agreement schemes [36] , provably secure online/offline IBS techniques [37] , and healthcare delivery systems [38] , have been reported. ...
doi:10.1109/access.2021.3114287
fatcat:dsmjcn262rhaxihnniytn5b7eu
An Efficient Conformable Fractional Chaotic Map-Based Online/Offline IBSS Scheme for Provable Security in ROM
2022
Complexity
This study gives an ability online/offline (O/O) ID-based short signature (IBSS) scheme using conformable fractional chaotic maps. ...
Some of the stimulating preparations of obtainable processes are that they give a multiperiod application of the offline storage, which licenses the agent to recycle the offline pre-registered data in ...
Figure 2 depicts the proposed online/offline IBSS scheme's configuration. ...
doi:10.1155/2022/6302328
fatcat:2j7uatwrbbfuld5ryhu4umtymi
An Efficient Online/Offline Signcryption Scheme for Internet of Things in Smart Home
2022
Wireless Communications and Mobile Computing
In this paper, a certificateless online/offline signcryption (COOS) technique for IoT-enabled smart homes is proposed. ...
The data imply that the recommended course of action is safe. ...
The KGC then retained possession of the master secret key and distributes the remaining data throughout the network. ...
doi:10.1155/2022/4215441
doaj:d7539f2e1d55468d8f3a724b0798ed75
fatcat:h34p7bl7szcvlfquvcvnny4r5u
Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts, Proactivity and Adaptive Security
[article]
2021
IACR Cryptology ePrint Archive
In this paper we present new, practical, threshold variants of the EC-DSA signature scheme that are provably secure (but not UC secure); realize both accountability and online/offline efficiency (in the ...
It handles adaptive adversaries, achieves accountability (by identifying corrupted parties in case of problems when generating the signature) and uses an interesting online/offline optimization where one ...
dblp:journals/iacr/CastagnosCLST21
fatcat:ienaorzcsja4fgrugbh7pc6cbe
Guest Editorial Special Issue on Trust-Oriented Designs of Internet of Things for Smart Cities
2020
IEEE Internet of Things Journal
presented a concrete construction of decentralized provable data possession by using multireplica storage tricks. ...
In the article "Blockchain-based dynamic provable data possession for smart cities," the authors described a blockchain-based PDP model to realize the decentralized outsourcing storage framework and then ...
doi:10.1109/jiot.2020.2982522
fatcat:gt364zdomzbhdpoio7lsw7bhmq
EFFICIENT DATA INTEGRITY AND AUDITING IN CLOUD BY USING BLOCK CHAIN
2020
International Journal of Innovative Research in Computer Science & Technology
Numerous data integrity auditing systems have been implemented to guarantee the quality of the data stored in the cloud. ...
Most of the new data integrity auditing system will be unable to operate if the user misplaced this hardware token or forgot this password. ...
ACKNOWLEDGMENT I thank our mentor Prof.Chethan Raj C for analyzing the data and advised on all aspects related to cloud storage, data integrity auditing, the other concept and validated the experimental ...
doi:10.21276/ijircst.2020.8.4.9
fatcat:5375uqbzungm3opqzjkv7fhw5i
GLUE: Generalizing Unbounded Attribute-Based Encryption for Flexible Efficiency Trade-Offs
[article]
2022
IACR Cryptology ePrint Archive
So far, any such schemes that support negations in the access policy or that have online/offline extensions have an inefficient decryption algorithm. ...
/offline extensions. ...
E Online/offline extension We give the online/offline variant [32] of GLUE. ...
dblp:journals/iacr/VenemaA22a
fatcat:ydziigaazrdpzmyfhw2vqayndm
Certificateless Bilinear Quantum Mutual Exclusive Signcryption for Data Security in Cloud
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
The new method inherits the security of bilinear mapping along with quantum, which possesses lower computation complexity than proxy operations, employed in signcrypting data in cloud environment. ...
In the BQ-MES method, only a designated authorized cloud user recovers the data stored in the cloud via cloud service provider by verifying the validity of a signcrypted data. ...
Yet another certificateless online/offline signcryption method was designed in [12] to provide data security. Despite security, anonymity of user was not provided. ...
doi:10.35940/ijitee.b7620.129219
fatcat:cimiugjnnnf4dizipshyo4a55q
Systematizing Core Properties of Pairing-Based Attribute-Based Encryption to Uncover Remaining Challenges in Enforcing Access Control in Practice
[article]
2021
IACR Cryptology ePrint Archive
As such, data can be stored by an entity that is not necessarily trusted to enforce access control, or an entity that is not even trusted to have access to the plaintext data at all. ...
Attribute-based encryption (ABE) cryptographically implements finegrained access control on data. ...
Open problem 4 (Generic online/offline conversions) To formulate a framework that provides generic conversions for any polynomial-based large-universe scheme to the online/offline setting. ...
dblp:journals/iacr/VenemaAH21
fatcat:qljh5dacwbcu3g3rqpyba74yre
IPAPA: Incentive Public Auditing Scheme against Procrastinating Auditor
2022
Journal of Internet Technology
<p>Cloud storage provides convenience in managing data for users. Data integrity becomes important because data owner (DO) loses control of their data once it is uploaded to the cloud server (CS). ...
Public auditing is used to check data integrity in cloud storage. Traditional public auditing schemes introduce a third-party auditor (TPA) to help users check their data. ...
We utilize interactive public provable data possession scheme. ...
doi:10.53106/160792642022122307006
fatcat:qhj3betspjb5ropqz6o3yykgfq
Principal Management of Extraordinary School on Learning Process during the COVID-19 Pandemic
2021
Al-Ishlah: Jurnal Pendidikan
Data collected from the field were evaluated by converting respondents into narrative form, making it easier to comprehend the findings when presented at the end of the study. ...
Students can select their preferred method of instruction, whether online, offline, or face-to-face. ...
research design is provable. ...
doi:10.35445/alishlah.v13i1.526
fatcat:ffa6sshoq5hqjpvixgtmxyh7nu
« Previous
Showing results 1 — 15 out of 78 results