Catálogo de publicaciones - libros

Compartir en
redes sociales


Information Security Practice and Experience: First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings

Robert H. Deng ; Feng Bao ; HweeHwa Pang ; Jianying Zhou (eds.)

En conferencia: 1º International Conference on Information Security Practice and Experience (ISPEC) . Singapore, Singapore . April 11, 2005 - April 14, 2005

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Data Encryption; Computer Communication Networks; Operating Systems; Computers and Society; Management of Computing and Information Systems; Information Storage and Retrieval

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2005 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-25584-0

ISBN electrónico

978-3-540-31979-5

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2005

Tabla de contenidos

Protecting Mass Data Basing on Small Trusted Agent

Fangyong Hou; Zhiying Wang; Kui Dai; Yun Liu

Providing data confidentiality and integrity is essential to ensure secure or trusted computing. Designs for such purpose always face substaintial difficulties, as providing solid security will be contrary to achieving satisfied performance. Basing on a less rigor precondition that will be tenable in many cases, such designs can be implemented with smaller endeavors. The core idea is to let a trusted agent to trustworthily hold one unique timestamp for each untrusted data block; and encrypts each block, as well as the related integrity code, through the corresponding timestamp. In such way, any malicious disclosure and tamper can be prevented. At the same time, each block can be directly verified by the associated timestamp without requiring additional data to minimize the cost of integrity checking, and OTP encryption scheme can pre-computes keystream to remove most encryption latencies.

Palabras clave: Hash Function; File System; Data Block; Replay Attack; Authentication Code.

- Data Security | Pp. 362-373

On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes

Zuowen Tan; Zhuojun Liu; Mingsheng Wang

A ( t , n ) threshold proxy signature scheme enables an original signer or a group of original signers to delegate the signature authority to a proxy group of n members such that not less than t proxy signers can cooperatively sign messages on behalf of the original signer or the original signer group. In the paper, we show that Sun’s and Yang et al.’s threshold proxy signature schemes are insecure against the original signer’s forgery, and that Tzeng et al.’s threshold multi-proxy multi-signature scheme is vulnerable against the actual original signer group’s forgery. We also show that Hsu et al.’s threshold proxy signature scheme suffers from the conspiracy of the original signer and the secret share dealer SA, and that Hwang et al.’s threshold proxy signature scheme is universally forgeable. In other words, none of the above-mentioned schemes holds the unforgeability and provides non-repudiation.

- Cryptographic Techniques II | Pp. 374-385

Token-Controlled Public Key Encryption

Joonsang Baek; Reihaneh Safavi-Naini; Willy Susilo

“Token-controlled public key encryption” is a public key encryption scheme where individual message can be encrypted and sent to every receiver, but the receiver cannot decrypt the message until he/she is given an extra piece of information called a “ token ”. The token will not reveal any information about the messages that the sender originally sent and the communication overhead for releasing the token is very small. Also, it is possible that a single token can control the decryption of a number of ciphertexts sent to multiple receivers. We formalize security model for such scheme and show efficient and provably secure constructions based on known computational assumptions in the random oracle model.

- Cryptographic Techniques II | Pp. 386-397

A New Class of Codes for Fingerprinting Schemes

Marcel Fernandez; Miguel Soriano; Josep Cotrina

In this paper we discuss the problem of collusion secure fingerprinting. In the first part of our contribution we prove the existence of equidistant codes that can be used as fingerprinting codes. Then we show that by giving algebraic structure to the equidistant code, the tracing process can be accomplished by passing a modified version of the Viterbi algorithm through the trellis representing the code.

- Cryptographic Techniques II | Pp. 398-409

t-Out-of-n String/Bit Oblivious Transfers Revisited

Qianhong Wu; Bo Qin; Changjie Wang; Xiaofeng Chen; Yumin Wang

In this paper, we focus on lowering the complexity of t -out-of- n string/bit OTs for large t . The notion of oblivious public-key cryptosystem (OPKC) is introduced, in which Bob possesses n public keys but only t private keys and no one knows which t private keys Bob possesses. If the sender, say, Alice, encrypts each message using the n oblivious public keys, resp., the receiver, Bob, can obtain only t messages by t decryptions with his known t private keys. This approach can be directly applied to t -out-of- n bit OT. However, it is very inefficient due to heavy message expansion and many encryption/decryption operations. To construct t -out-of- n bit OT, we introduce bit oblivious public-key cryptosystem (BOPKC), which is a special public-key cryptosystem with a message space of n bits, and the private key only enables its owner to decrypt t bits of n secret bits. After an offline generation of such a BOPKC, it requires only one encryption, one decryption and one ciphertext. Finally, we show the concrete implementations of OPKC/BOPKC based on ElGamal/Paillier cryptosystem, and efficient t -out-of- n string/bit OTs are achieved.

- Cryptographic Techniques II | Pp. 410-421