Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 6 papers published in subject: > since this site started. |
Results per page: |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. Buyer-seller watermarking protocols suitable for probabilistic privacy homomorphisms | |||
ZENG Peng | |||
Computer Science and Technology 10 November 2014 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:A common limitation of some recently proposed watermarking protocols lies in the requirement of deterministic privacy homomorphisms which would result in an inevitable contradiction between the security and the robustness of watermarks. The present paper provides afix to two important buyer-seller watermarking protocols by removingthis limitation. In addition, the improved protocols solve thesecure verification problem existing in the original ones. | |||
TO cite this article:ZENG Peng. Buyer-seller watermarking protocols suitable for probabilistic privacy homomorphisms[OL].[10 November 2014] http://en.paper.edu.cn/en_releasepaper/content/4617972 |
2. Security Enhancement to a User Authentication Scheme for Multi-Server Environment | |||
ZENG Peng | |||
Computer Science and Technology 29 October 2014 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:User authentication schemes for multi-server setting allow a remote user to obtain services from multiple servers without the need to separately register with every individual server.In general, user authentication schemes for a multi-server environment should provide the following properties: single registration,low computation, no need for verification table, mutual authentication and key agreement, and security.Recently Wang, Juang, and Lei proposed a privacy-preservation user authentication scheme based on the quadratic residue and claimed the scheme meets all five requirements.In this paper, we demonstrate that their scheme is, unfortunately, vulnerable to a previously unpublished parallel-session attack.In other words, this attack enables a malicious user to impersonate legitimate users and obtain services from participating application servers without the victims' knowledge.We then show how the flaw in Wang emph{et al.}'s scheme can be fixed. | |||
TO cite this article:ZENG Peng. Security Enhancement to a User Authentication Scheme for Multi-Server Environment[OL].[29 October 2014] http://en.paper.edu.cn/en_releasepaper/content/4615680 |
3. Generalized Format-preserving Encryption for Character Data | |||
Ma Haoyu,Liu Zheli,Jia Chunfu,Yuan Ke | |||
Computer Science and Technology 04 May 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:We studied format-preserving encryption (FPE) for character data, for solutions that encipher character strings while preserving both their lengths and memory consumptions. By clustering characters into multiple sets according to the number of bytes they are encoded, we managed to establish mixed-radix numeral systems for character data. Under such systems, we proposed a basic method for character data that exploits existing FPEs, as well as a generalized character FPE scheme using Feistel-based construction, where a customized ``dynamic modular addition'' is used to ensure the feasibility the scheme. Our work showed a new way of designing encryption methods for arbitrary message spaces, which involves no tradeoff between efficacy and efficiency. | |||
TO cite this article:Ma Haoyu,Liu Zheli,Jia Chunfu, et al. Generalized Format-preserving Encryption for Character Data[OL].[ 4 May 2013] http://en.paper.edu.cn/en_releasepaper/content/4540303 |
4. Parallel hash function using DM-based integer-valued chaotic maps network | |||
Liao Dong,Wang Xiaomin | |||
Computer Science and Technology 10 December 2012 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:A parallel hash function using DM-based integer-valued chaotic maps network is proposed which combines the advantage of both chaotic system and DM scheme. And the algorithm has avoided the flaw of the forgery attack of the exiting parallel hash functions. The algorithm can be used to calculate hash values of 128, 160, 192, 256, 384 and 512 bits with little difference in performance for the different hash values. The message is partitioned into message blocks with fixed length and each message block is processed by the integer-valued chaotic maps network in parallel. The final hash value is generated with a sponge-like construction, which confuses the mixed result of all the outputs of the integer-valued chaotic maps network. The hash function is mainly implemented by extend integer-valued tent maps and can work in a parallel mode, which guarantees good security and high efficiency. Theoretical and simulation results show that the proposed hash algorithm has strong diffusion and confusion capability and good collision resistance. These properties make it a good candidate for hash on platforms that support parallel processing. | |||
TO cite this article:Liao Dong,Wang Xiaomin. Parallel hash function using DM-based integer-valued chaotic maps network[OL].[10 December 2012] http://en.paper.edu.cn/en_releasepaper/content/4500967 |
5. Conditionally Anonymous Ring Signature \ Scheme without Random Oracles | |||
Zeng Shengke,Qin Zhiguang,Lu Qing | |||
Computer Science and Technology 08 February 2012 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Compared to the original ring signature scheme, conditionally anonymous ring signature allows to revoke the anonymity of the actual signer without the group manager's help, i.e., in case of dispute, the actual signer can be traced through signer's confirmation or the non-signers' disavowal. However, the previous conditionally anonymous ring signature schemes rely on random oracles, in the other words, the security of such schemes depend on the randomness of the hash functions. In order to improve the security, this paper proposes a ring signature scheme with traceability without random oracles in the common reference string model. | |||
TO cite this article:Zeng Shengke,Qin Zhiguang,Lu Qing. Conditionally Anonymous Ring Signature \ Scheme without Random Oracles[OL].[ 8 February 2012] http://en.paper.edu.cn/en_releasepaper/content/4463457 |
6. Advanced Framework for Iterative Hash Functions---C-hash | |||
Zhimin Li,Bo Yang,Lin Li,Shihui Zheng,Yixian Yang,Zhang Zhihui | |||
Computer Science and Technology 14 November 2007 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In this paper, we study the cryptanalytical techniques to perform Joux multi-collision, Kelsey and Schneier generic long message second preimage attack and Kelsey and Kohno herding attack on the Merkle-Damgard construction as well as its variants with XOR-linear/additive checksums and propose an advanced Merkle-Damgard construction, C-hash, by changing the feedback addition value, which can add the computation complexity of the generic attacks, compared with Merkle-Damgard construction and its variants. | |||
TO cite this article:Zhimin Li,Bo Yang,Lin Li, et al. Advanced Framework for Iterative Hash Functions---C-hash[OL].[14 November 2007] http://en.paper.edu.cn/en_releasepaper/content/16347 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
Results per page: |
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated