Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








78 Hits in 3.4 sec

Online/Offline Provable Data Possession

Yujue Wang, Qianhong Wu, Bo Qin, Shaohua Tang, Willy Susilo
2017 IEEE Transactions on Information Forensics and Security  
Index Terms-Provable data possession, chameleon hash, online/offline signature, data outsourcing, cloud storage.  ...  Provable data possession (PDP) allows a user to outsource data with a guarantee that the integrity can be efficiently verified.  ...  Related Work 1) Provable Data Possession: Outsourced data in clouds confront many security threats [13] such as integrity and privacy. To tackle the integrity issue, Ateniese et al.  ... 
doi:10.1109/tifs.2017.2656461 fatcat:yfbi3kip6begxceqtr5jntki2a

New Online/Offline Signature Schemes Without Random Oracles [chapter]

Kaoru Kurosawa, Katja Schmidt-Samoa
2006 Lecture Notes in Computer Science  
Our proposals utilize Shamir-Tauman's generic construction for building EF-CMA secure online/offline signature schemes from trapdoor commitments and less secure basic signature schemes.  ...  In this paper, we propose new signature schemes provably secure under the strong RSA assumption in the standard model.  ...  Online/Offline Signature Schemes The notion of online/offline signatures was introduced by Even et al. [EGM96] .  ... 
doi:10.1007/11745853_22 fatcat:cwagbppkhzcs5h5sxpetaofxa4

Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security [chapter]

Shidi Xu, Yi Mu, Willy Susilo
2006 Lecture Notes in Computer Science  
In this paper, we first introduce an efficient ID-based online/offline scheme for authentication in AODV and then provide a formal transformation to convert the scheme to an ID-based online/offline multisignature  ...  Our scheme is unique, in the sense that a single ID-based online/offline signature scheme can be applied to both AODV and DSR routing protocols.  ...  ID-based Online/Offline Signature Scheme Definition 3.  ... 
doi:10.1007/11780656_9 fatcat:ctxeigmhuvf2piusvk22q3c7li

R-OO-KASE: Revocable Online/Offline Key Aggregate Searchable Encryption

Mukti Padhya, Devesh C. Jinwala
2020 Data Science and Engineering  
Motivated with the goal to reduce the computational cost, in this paper, we propose a Revocable Online/Offline KASE (R-OO-KASE) scheme, based on the idea of splitting the encryption/decryption operations  ...  The security analysis and empirical evaluations show that the proposed scheme is efficient to use in resource-constrained devices and provably secure as compared to the existing KASE schemes.  ...  Online/Offline Decryption The cloud server sends search results to the query requester.  ... 
doi:10.1007/s41019-020-00136-y fatcat:x7sevlxkvnah3du7tb6khvnhde

IBOOST: A Lightweight Provably Secure Identity-based Online/Offline Signature Technique based on FCM for Massive Devices in 5G Wireless Sensor Networks

Chandrashekhar Meshram, Agbotiname Lucky Imoize, Azeddine Elhassouny, Amer Aljaedi, Adel R. Alharbi, Sajjad Shaukat Jamal
2021 IEEE Access  
Thus, the transmission of personal data over these wireless channels needs to be supported by lightweight and provably secure online/offline identity-based signature techniques (IBS) [15] .  ...  Chaosbased key agreement schemes [36] , provably secure online/offline IBS techniques [37] , and healthcare delivery systems [38] , have been reported.  ... 
doi:10.1109/access.2021.3114287 fatcat:dsmjcn262rhaxihnniytn5b7eu

An Efficient Conformable Fractional Chaotic Map-Based Online/Offline IBSS Scheme for Provable Security in ROM

Chandrashekhar Meshram, Rabha W. Ibrahim, Rafida M. Elobaid, Honglei Xu
2022 Complexity  
This study gives an ability online/offline (O/O) ID-based short signature (IBSS) scheme using conformable fractional chaotic maps.  ...  Some of the stimulating preparations of obtainable processes are that they give a multiperiod application of the offline storage, which licenses the agent to recycle the offline pre-registered data in  ...  Figure 2 depicts the proposed online/offline IBSS scheme's configuration.  ... 
doi:10.1155/2022/6302328 fatcat:2j7uatwrbbfuld5ryhu4umtymi

An Efficient Online/Offline Signcryption Scheme for Internet of Things in Smart Home

null Nayab, Saddam Hussain, Amerah Alabrah, Syed Sajid Ullah, Hizbullah Khattak, Taha M. Alfakih, Insaf Ullah
2022 Wireless Communications and Mobile Computing  
In this paper, a certificateless online/offline signcryption (COOS) technique for IoT-enabled smart homes is proposed.  ...  The data imply that the recommended course of action is safe.  ...  The KGC then retained possession of the master secret key and distributes the remaining data throughout the network.  ... 
doi:10.1155/2022/4215441 doaj:d7539f2e1d55468d8f3a724b0798ed75 fatcat:h34p7bl7szcvlfquvcvnny4r5u

Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts, Proactivity and Adaptive Security [article]

Guilhem Castagnos, Dario Catalano, Fabien Laguillaumie, Federico Savasta, Ida Tucker
2021 IACR Cryptology ePrint Archive  
In this paper we present new, practical, threshold variants of the EC-DSA signature scheme that are provably secure (but not UC secure); realize both accountability and online/offline efficiency (in the  ...  It handles adaptive adversaries, achieves accountability (by identifying corrupted parties in case of problems when generating the signature) and uses an interesting online/offline optimization where one  ... 
dblp:journals/iacr/CastagnosCLST21 fatcat:ienaorzcsja4fgrugbh7pc6cbe

Guest Editorial Special Issue on Trust-Oriented Designs of Internet of Things for Smart Cities

Meng Shen, Ke Xu, Xiaojiang Du, Martin J. Reed, Md Zakirul Alam Bhuiyan, Lan Zhang, Rashid Mijumbi
2020 IEEE Internet of Things Journal  
presented a concrete construction of decentralized provable data possession by using multireplica storage tricks.  ...  In the article "Blockchain-based dynamic provable data possession for smart cities," the authors described a blockchain-based PDP model to realize the decentralized outsourcing storage framework and then  ... 
doi:10.1109/jiot.2020.2982522 fatcat:gt364zdomzbhdpoio7lsw7bhmq

EFFICIENT DATA INTEGRITY AND AUDITING IN CLOUD BY USING BLOCK CHAIN

Prof Chethan Raj C, Shivani M S, Sowjanya D R, Sowmya M T, Tejaswini D R
2020 International Journal of Innovative Research in Computer Science & Technology  
Numerous data integrity auditing systems have been implemented to guarantee the quality of the data stored in the cloud.  ...  Most of the new data integrity auditing system will be unable to operate if the user misplaced this hardware token or forgot this password.  ...  ACKNOWLEDGMENT I thank our mentor Prof.Chethan Raj C for analyzing the data and advised on all aspects related to cloud storage, data integrity auditing, the other concept and validated the experimental  ... 
doi:10.21276/ijircst.2020.8.4.9 fatcat:5375uqbzungm3opqzjkv7fhw5i

GLUE: Generalizing Unbounded Attribute-Based Encryption for Flexible Efficiency Trade-Offs [article]

Marloes Venema, Greg Alpár
2022 IACR Cryptology ePrint Archive  
So far, any such schemes that support negations in the access policy or that have online/offline extensions have an inefficient decryption algorithm.  ...  /offline extensions.  ...  E Online/offline extension We give the online/offline variant [32] of GLUE.  ... 
dblp:journals/iacr/VenemaA22a fatcat:ydziigaazrdpzmyfhw2vqayndm

Certificateless Bilinear Quantum Mutual Exclusive Signcryption for Data Security in Cloud

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
The new method inherits the security of bilinear mapping along with quantum, which possesses lower computation complexity than proxy operations, employed in signcrypting data in cloud environment.  ...  In the BQ-MES method, only a designated authorized cloud user recovers the data stored in the cloud via cloud service provider by verifying the validity of a signcrypted data.  ...  Yet another certificateless online/offline signcryption method was designed in [12] to provide data security. Despite security, anonymity of user was not provided.  ... 
doi:10.35940/ijitee.b7620.129219 fatcat:cimiugjnnnf4dizipshyo4a55q

Systematizing Core Properties of Pairing-Based Attribute-Based Encryption to Uncover Remaining Challenges in Enforcing Access Control in Practice [article]

Marloes Venema, Greg Alpár, Jaap-Henk Hoepman
2021 IACR Cryptology ePrint Archive  
As such, data can be stored by an entity that is not necessarily trusted to enforce access control, or an entity that is not even trusted to have access to the plaintext data at all.  ...  Attribute-based encryption (ABE) cryptographically implements finegrained access control on data.  ...  Open problem 4 (Generic online/offline conversions) To formulate a framework that provides generic conversions for any polynomial-based large-universe scheme to the online/offline setting.  ... 
dblp:journals/iacr/VenemaAH21 fatcat:qljh5dacwbcu3g3rqpyba74yre

IPAPA: Incentive Public Auditing Scheme against Procrastinating Auditor

Ying Miao Ying Miao, Qiong Huang Ying Miao, Meiyan Xiao Qiong Huang, Willy Susilo Meiyan Xiao
2022 Journal of Internet Technology  
<p>Cloud storage provides convenience in managing data for users. Data integrity becomes important because data owner (DO) loses control of their data once it is uploaded to the cloud server (CS).  ...  Public auditing is used to check data integrity in cloud storage. Traditional public auditing schemes introduce a third-party auditor (TPA) to help users check their data.  ...  We utilize interactive public provable data possession scheme.  ... 
doi:10.53106/160792642022122307006 fatcat:qhj3betspjb5ropqz6o3yykgfq

Principal Management of Extraordinary School on Learning Process during the COVID-19 Pandemic

Musliadi Musliadi, Cut Zahri Harun, Bahrun Bahrun
2021 Al-Ishlah: Jurnal Pendidikan  
Data collected from the field were evaluated by converting respondents into narrative form, making it easier to comprehend the findings when presented at the end of the study.  ...  Students can select their preferred method of instruction, whether online, offline, or face-to-face.  ...  research design is provable.  ... 
doi:10.35445/alishlah.v13i1.526 fatcat:ffa6sshoq5hqjpvixgtmxyh7nu
« Previous Showing results 1 — 15 out of 78 results