Collusion attack free identity-based cryptosystems

Author(s):  
H. Tanaka
2013 ◽  
Vol 385-386 ◽  
pp. 1808-1812 ◽  
Author(s):  
Qiu Na Niu

An efficient identity-based (or ID-based) multi-signature (IBMS) scheme from RSA is proposed based on a variation of the Fiat-Shamir signature scheme. The proposed scheme with fixed signature length has a much more efficient signing procedure. Each user can sign a different message; subsequently a set of signatures can be turned into a multi-signature via an aggregation process which may be executed by any entity. Also the multi-signature verification time of modulo exponentiations required is the same as that of a single signature. And the proposed scheme can be proved to be secure against attacks from the adaptive given identity attack, chosen message attack and multi-signer collusion attack.


2018 ◽  
Vol 2018 ◽  
pp. 1-10
Author(s):  
Chi Yuan ◽  
Wenping Chen ◽  
Deying Li

The sensors in wireless sensor network (WSN) are vulnerable to malicious attacks due to the transmission nature of wireless media. Secure and authenticated message delivery with low energy consumption is one of the major aims in WSN. The identity-based key authentication scheme is more suitable for the WSN. In this paper, the Hierarchical Matrix Decomposition-based Signcryption (HMDS) algorithm was proposed, which is a kind of identity-based authentication scheme. In HMDS scheme, three-layer architecture, base station (BS), cluster head, and intracluster, is employed to adapt to the common structure of WSN. As the key generation center (KGC), the BS adopts matrix decomposition to generate the identification information and public key for cluster head, which not only reduces the cost of calculation and storage but also avoids the collusion attack. Experiments show that the HMDS algorithm has more advantages over other algorithms and is very suitable for the large-scale WSN.


2021 ◽  
Vol 0 (0) ◽  
pp. 0
Author(s):  
Vikas Srivastava ◽  
Sumit Kumar Debnath ◽  
Pantelimon Stǎnicǎ ◽  
Saibal Kumar Pal

<p style='text-indent:20px;'>When Kevin Ashton proposed the catchword 'Internet of Things' in 1999, little did he know that technology will become an indispensable part of human lives in just two decades. In short, the Internet of Things (IoT), is a catch-all terminology used to describe devices connected to the internet. These devices can share and receive data as well as provide instructions over a network. By design itself, the IoT system requires multicasting data and information to a set of designated devices, securely. Taking everything into account, Broadcast Encryption (BE) seems to be the natural choice to address the problem. BE allows an originator to broadcast ciphertexts to a big group of receivers in a well-organized and competent way, while ensuring that only designated people can decrypt the data. In this work, we put forward the first Identity-Based Broadcast Encryption scheme based on multivariate polynomials that achieves post-quantum security. Multivariate public key cryptosystems (MPKC), touted as one of the most promising post-quantum cryptography candidates, forms the foundation on which our scheme relies upon, which allows it to be very cost-effective and faster when implemented. In addition, it also provides resistance to collusion attack, and as a consequence our scheme can be utilized to form an efficient and robust IoT system.</p>


Informatica ◽  
2017 ◽  
Vol 28 (1) ◽  
pp. 193-214 ◽  
Author(s):  
Tung-Tso Tsai ◽  
Sen-Shan Huang ◽  
Yuh-Min Tseng

Author(s):  
Jae Hong SEO ◽  
Tetsutaro KOBAYASHI ◽  
Miyako OHKUBO ◽  
Koutarou SUZUKI

2017 ◽  
Vol 1 (1) ◽  
pp. 15-31
Author(s):  
Francisco Xavier Morales

The problem of identity is an issue of contemporary society that is not only expressed in daily life concerns but also in discourses of politics and social movements. Nevertheless, the I and the needs of self-fulfillment usually are taken for granted. This paper offers thoughts regarding individual identity based on Niklas Luhmann’s systems theory. From this perspective, identity is not observed as a thing or as a subject, but rather as a “selfillusion” of a system of consciousness, which differentiates itself from the world, event after event, in a contingent way. As concerns the definition  of contents of self-identity, the structures of social systems define who is a person, how he or she should act, and how much esteem he or she should receive. These structures are adopted by consciousness as its own identity structures; however, some social contexts are more relevant for self-identity construction than others. Moral communication increases the probability that structure appropriation takes place, since the emotional element of identity is linked to the esteem/misesteem received by the individual from the interactions in which he or she participates.


Sign in / Sign up

Export Citation Format

Share Document