Articles with "provably secure" as a keyword



Photo by hudsoncrafted from unsplash

A new design paradigm for provably secure keyless hash function with subsets and two variables polynomial function

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of King Saud University - Computer and Information Sciences"

DOI: 10.1016/j.jksuci.2019.10.003

Abstract: Abstract Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256,… read more here.

Keywords: provably secure; polynomial function; sha; hash function ... See more keywords
Photo by erwanhesry from unsplash

LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3005592

Abstract: Wireless body area networks (WBANs) and wireless sensor networks (WSNs) are important concepts for the Internet of Things (IoT). They have been applied to various healthcare services to ensure that users can access convenient medical… read more here.

Keywords: verification table; authentication; laks nvt; provably secure ... See more keywords
Photo by scottwebb from unsplash

An Ultra-Lightweight and Provably Secure Broadcast Authentication Protocol for Smart Grid Communications

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3007623

Abstract: The information and communication technology (ICT) can bring attractive features to the traditional power grid such as energy conserving, reliability, efficiency, transparency, and cost reducing. All of these features can be accomplished with a concept… read more here.

Keywords: secure broadcast; authentication; security; smart grid ... See more keywords
Photo by papaioannou_kostas from unsplash

CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique based on Fractional Chaotic Maps

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3165565

Abstract: In recent years, there has been a lot of research interest in analysing chaotic constructions and their associated cryptographic structures. Compared with the essential combination of encryption and signature, the signcryption scheme has a more… read more here.

Keywords: provably secure; signcryption; group; fractional chaotic ... See more keywords
Photo from wikipedia

A Lightweight Provably Secure Digital Short-Signature Technique Using Extended Chaotic Maps for Human-Centered IoT Systems

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2020.3043358

Abstract: Internet of Things (IoT) consists of numerous smart devices for sharing sensed data through the availability of online services. Direct communication by smart devices with people to identify parameters of healthcare and send them to… read more here.

Keywords: technique; smart devices; provably secure; signature technique ... See more keywords
Photo from wikipedia

A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Consumer Electronics"

DOI: 10.1109/tce.2020.3035566

Abstract: Universal Serial Bus (USB) is widely used, for example to facilitate hot-swapping and plug-and-play. However, USB ports can be exploited by an adversary to extract private or personal data from the connected devices. Hence, a… read more here.

Keywords: usb storage; two factor; scheme; secure two ... See more keywords
Photo from wikipedia

Valkyrie: Vulnerability Assessment Tool and Attack for Provably-Secure Logic Locking Techniques

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3149147

Abstract: Protection of the design intellectual property (IP) has become a pertinent need owing to the globalized integrated circuit (IC) supply chain. Logic locking has been perceived as a holistic solution ensuring protection against multiple supply… read more here.

Keywords: tool; provably secure; locking techniques; security ... See more keywords
Photo by hajjidirir from unsplash

FLCert: Provably Secure Federated Learning Against Poisoning Attacks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3212174

Abstract: Due to its distributed nature, federated learning is vulnerable to poisoning attacks, in which malicious clients poison the training process via manipulating their local training data and/or local model updates sent to the cloud server,… read more here.

Keywords: provably secure; flcert provably; federated learning; secure federated ... See more keywords
Photo from wikipedia

An Efficient and Provably Secure Certificateless Protocol for Industrial Internet of Things

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2022.3156629

Abstract: The Internet of Things (IoT) has a wide range of applications that influence the life of people expeditiously. In recent years, IoT becomes an emerging technology in a number of fields. Different devices with divergent… read more here.

Keywords: provably secure; industrial internet; security; scheme ... See more keywords
Photo by lucabravo from unsplash

Provably Secure Group Signature Schemes From Code-Based Assumptions

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Information Theory"

DOI: 10.1109/tit.2020.2976073

Abstract: We solve an open question in code-based cryptography by introducing two provably secure group signature schemes from code-based assumptions. Our basic scheme satisfies the CPA-anonymity and traceability requirements in the random oracle model, assuming the… read more here.

Keywords: code based; signature schemes; provably secure; group signature ... See more keywords
Photo by lucabravo from unsplash

Provably secure identity-based identification and signature schemes from code assumptions

Sign Up to like & get
recommendations!
Published in 2017 at "PLoS ONE"

DOI: 10.1371/journal.pone.0182894

Abstract: Code-based cryptography is one of few alternatives supposed to be secure in a post-quantum world. Meanwhile, identity-based identification and signature (IBI/IBS) schemes are two of the most fundamental cryptographic primitives, so several code-based IBI/IBS schemes… read more here.

Keywords: code based; provably secure; identity based; signature ... See more keywords