Articles with "provably secure" as a keyword



A new design paradigm for provably secure keyless hash function with subsets and two variables polynomial function

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of King Saud University - Computer and Information Sciences"

DOI: 10.1016/j.jksuci.2019.10.003

Abstract: Abstract Provably secure keyless hash function uses Random Oracle (RO) or Sponge principles for the design and construction of security-centric hash algorithms. It capitalizes the aforesaid principles to produce outcomes like MD2, MD5, SHA-160, SHA-224/256,… read more here.

Keywords: provably secure; polynomial function; sha; hash function ... See more keywords

LAKS-NVT: Provably Secure and Lightweight Authentication and Key Agreement Scheme Without Verification Table in Medical Internet of Things

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3005592

Abstract: Wireless body area networks (WBANs) and wireless sensor networks (WSNs) are important concepts for the Internet of Things (IoT). They have been applied to various healthcare services to ensure that users can access convenient medical… read more here.

Keywords: verification table; authentication; laks nvt; provably secure ... See more keywords

An Ultra-Lightweight and Provably Secure Broadcast Authentication Protocol for Smart Grid Communications

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3007623

Abstract: The information and communication technology (ICT) can bring attractive features to the traditional power grid such as energy conserving, reliability, efficiency, transparency, and cost reducing. All of these features can be accomplished with a concept… read more here.

Keywords: secure broadcast; authentication; security; smart grid ... See more keywords

CGST: Provably Secure Lightweight Certificateless Group Signcryption Technique based on Fractional Chaotic Maps

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3165565

Abstract: In recent years, there has been a lot of research interest in analysing chaotic constructions and their associated cryptographic structures. Compared with the essential combination of encryption and signature, the signcryption scheme has a more… read more here.

Keywords: provably secure; signcryption; group; fractional chaotic ... See more keywords
Photo from wikipedia

A Lightweight Provably Secure Digital Short-Signature Technique Using Extended Chaotic Maps for Human-Centered IoT Systems

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2020.3043358

Abstract: Internet of Things (IoT) consists of numerous smart devices for sharing sensed data through the availability of online services. Direct communication by smart devices with people to identify parameters of healthcare and send them to… read more here.

Keywords: technique; smart devices; provably secure; signature technique ... See more keywords

A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Consumer Electronics"

DOI: 10.1109/tce.2020.3035566

Abstract: Universal Serial Bus (USB) is widely used, for example to facilitate hot-swapping and plug-and-play. However, USB ports can be exploited by an adversary to extract private or personal data from the connected devices. Hence, a… read more here.

Keywords: usb storage; two factor; scheme; secure two ... See more keywords

Valkyrie: Vulnerability Assessment Tool and Attack for Provably-Secure Logic Locking Techniques

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3149147

Abstract: Protection of the design intellectual property (IP) has become a pertinent need owing to the globalized integrated circuit (IC) supply chain. Logic locking has been perceived as a holistic solution ensuring protection against multiple supply… read more here.

Keywords: tool; provably secure; locking techniques; security ... See more keywords

FLCert: Provably Secure Federated Learning Against Poisoning Attacks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3212174

Abstract: Due to its distributed nature, federated learning is vulnerable to poisoning attacks, in which malicious clients poison the training process via manipulating their local training data and/or local model updates sent to the cloud server,… read more here.

Keywords: provably secure; flcert provably; federated learning; secure federated ... See more keywords

An Efficient and Provably Secure Certificateless Protocol for Industrial Internet of Things

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2022.3156629

Abstract: The Internet of Things (IoT) has a wide range of applications that influence the life of people expeditiously. In recent years, IoT becomes an emerging technology in a number of fields. Different devices with divergent… read more here.

Keywords: provably secure; industrial internet; security; scheme ... See more keywords

A Provably Secure Lightweight Authentication Based on Elliptic Curve Signcryption for Vehicle-to-Vehicle Communication in VANETs

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2023.3313527

Abstract: In vehicular ad hoc networks, the exchange of safety messages plays a crucial role in transportation efficiency and safety. However, safety messages are generally only signed rather than encrypted when broadcast, which lures malicious attackers… read more here.

Keywords: provably secure; vehicle; signcryption; elliptic curve ... See more keywords

Provably Secure Group Signature Schemes From Code-Based Assumptions

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Information Theory"

DOI: 10.1109/tit.2020.2976073

Abstract: We solve an open question in code-based cryptography by introducing two provably secure group signature schemes from code-based assumptions. Our basic scheme satisfies the CPA-anonymity and traceability requirements in the random oracle model, assuming the… read more here.

Keywords: code based; signature schemes; provably secure; group signature ... See more keywords