secure protocols
Recently Published Documents


TOTAL DOCUMENTS

90
(FIVE YEARS 18)

H-INDEX

15
(FIVE YEARS 2)

Mobile ad hoc networks as an infrastructure free, and constrained resource environment network. The network aim is to establish internet connectivity everywhere regardless of location. The applications of network are healthcare, disaster relief and military, where reliable communication is major concern. Communication in the network is initiated by establishing the communication route between source and destination and sending the information through it. One of the characteristics of MANETs is a peer-to-peer network, where intermediate nodes have to cooperate for reliable communication by acting as routers. In literature number of routing protocols have been designed based on the MANET’s peer to peer characteristic. However, it may not be every time true that the intermediate nodes act as faithful routers, and they may untrustworthy either due to malicious behavior or bottleneck. Number of secure protocols have been designed to mitigate malicious behavior by neglecting the bottleneck. The paper aims to define the bottleneck, and its importance in communication. Finally, how bottleneck influence on the MANETs performance during malicious nodes mitigation


2021 ◽  
pp. 1-40
Author(s):  
Carsten Baum ◽  
Daniel Escudero ◽  
Alberto Pedrouzo-Ulloa ◽  
Peter Scholl ◽  
Juan Ramón Troncoso-Pastoriza

An oblivious linear function evaluation protocol, or OLE, is a two-party protocol for the function f ( x ) = a x + b, where a sender inputs the field elements a, b, and a receiver inputs x and learns f ( x ). OLE can be used to build secret-shared multiplication, and is an essential component of many secure computation applications including general-purpose multi-party computation, private set intersection and more. In this work, we present several efficient OLE protocols from the ring learning with errors (RLWE) assumption. Technically, we build two new passively secure protocols, which build upon recent advances in homomorphic secret sharing from (R)LWE (Boyle et al. in: EUROCRYPT 2019, Part II (2019) 3–33 Springer), with optimizations tailored to the setting of OLE. We upgrade these to active security using efficient amortized zero-knowledge techniques for lattice relations (Baum et al. in: CRYPTO 2018, Part II (2018) 669–699 Springer), and design new variants of zero-knowledge arguments that are necessary for some of our constructions. Our protocols offer several advantages over existing constructions. Firstly, they have the lowest communication complexity amongst previous, practical protocols from RLWE and other assumptions; secondly, they are conceptually very simple, and have just one round of interaction for the case of OLE where b is randomly chosen. We demonstrate this with an implementation of one of our passively secure protocols, which can perform more than 1 million OLEs per second over the ring Z m , for a 120-bit modulus m, on standard hardware.


2021 ◽  
Author(s):  
Aboul Ella Hassanien ◽  
Mohamed Torky ◽  
Essam Goda ◽  
Vaclav Snasel ◽  
Tarek Gaber

Abstract Blockchain technology can play a vital role in the space industry and satellite communication. This disruptive technology can build decentralized and secure protocols for processing and manipulating space transactions in the form of space digital tokens (SDTs). Tokenizing space transactions in the form of SDTs will enable various blockchain-based applications in the space industry. Moreover, blockchain protocols based on smart contracts can be utilized to authenticate many space transactions and P2P communications in a transparent, verifiable, and secure manner. This paper proposes a new blockchain-based solution for managing and securing satellite transactions using a novel concept called SDT. SDT is then used to develop a new blockchain protocol called proof of space transactions (PoST), which is then used in proposing a new blockchain-based protocol for authenticating satellite transactions. The proposed PoST protocol is implemented and simulated using the Ethereum blockchain. Five metrics are used to evaluate the protocol's performance: Ethereum GAZ, read latency, transaction latency, read throughput, and transaction throughput. The performance evaluation results proved the efficiency and reliability of PoST in managing and securing satellite transactions.


Cybersecurity ◽  
2021 ◽  
pp. 131-148
Author(s):  
Poonam Sharma ◽  
Prabhjot Kaur ◽  
Kamaljit Singh Saini

Author(s):  
Rydhm Beri , Et. al.

5G communication technology works with the integration of several technologies viz. Cloud Computing, network partitioning and software based networks. This integration allows the communication between thousands of device across the world which have enormous issues related to data protection, data authenticity, and data confidentiality. So, there is an immense need of secure protocols to face or resolve security related issues related to design and operation of 5G network. Moreover, some structured cryptography protocols required to develop and accomplish data security in 5G communication. The study focussing on the comprehensive consequences of quantum computing on security implementations of 5G mobile communications. The study discussing about the cryptographic algorithm used in 5G, and what are the various consequences of involvement of quantum computing.


Author(s):  
Sumana M. ◽  
Hareesha K. S. ◽  
Sampath Kumar

Essential predictions are to be made by the parties distributed at multiple locations. However, in the process of building a model, perceptive data is not to be revealed. Maintaining the privacy of such data is a foremost concern. Earlier approaches developed for classification and prediction are proven not to be secure enough and the performance is affected. This chapter focuses on the secure construction of commonly used classifiers. The computations performed during model building are proved to be semantically secure. The homomorphism and probabilistic property of Paillier is used to perform secure product, mean, and variance calculations. The secure computations are performed without any intermediate data or the sensitive data at multiple sites being revealed. It is observed that the accuracy of the classifiers modeled is almost equivalent to the non-privacy preserving classifiers. Secure protocols require reduced computation time and communication cost. It is also proved that proposed privacy preserving classifiers perform significantly better than the base classifiers.


Electronics ◽  
2020 ◽  
Vol 9 (1) ◽  
pp. 178
Author(s):  
Yuan Ping ◽  
Bin Hao ◽  
Xiali Hei ◽  
Jie Wu ◽  
Baocang Wang

Despite its remarkable capability in handling arbitrary cluster shapes, support vector clustering (SVC) suffers from pricey storage of kernel matrix and costly computations. Outsourcing data or function on demand is intuitively expected, yet it raises a great violation of privacy. We propose maximized privacy-preserving outsourcing on SVC (MPPSVC), which, to the best of our knowledge, is the first all-phase outsourceable solution. For privacy-preserving, we exploit the properties of homomorphic encryption and secure two-party computation. To break through the operation limitation, we propose a reformative SVC with elementary operations (RSVC-EO, the core of MPPSVC), in which a series of designs make selective outsourcing phase possible. In the training phase, we develop a dual coordinate descent solver, which avoids interactions before getting the encrypted coefficient vector. In the labeling phase, we design a fresh convex decomposition cluster labeling, by which no iteration is required by convex decomposition and no sampling checks exist in connectivity analysis. Afterward, we customize secure protocols to match these operations for essential interactions in the encrypted domain. Considering the privacy-preserving property and efficiency in a semi-honest environment, we proved MPPSVC’s robustness against adversarial attacks. Our experimental results confirm that MPPSVC achieves comparable accuracies to RSVC-EO, which outperforms the state-of-the-art variants of SVC.


2020 ◽  
Vol 22 (3) ◽  
pp. 1942-1976 ◽  
Author(s):  
Dimitrios Pliatsios ◽  
Panagiotis Sarigiannidis ◽  
Thomas Lagkas ◽  
Antonios G. Sarigiannidis

2020 ◽  
Vol 169 ◽  
pp. 407-411
Author(s):  
Ilya Sukhodolskiy ◽  
Sergey Zapechnikov
Keyword(s):  

The recent advancements in Information Technology have brought considerable changes in the way tasks are accomplished across the globe. The world has become a more connected place and a major impact as well as reason of this can be attributed to the steep rise in the usage of mobile devices. Mobile devices are being used for online payments in the form of shopping, money transfers, bill payments and what not. The majority of monetary transactions on the Internet now take place through mobile devices and therefore, mobile payment systems being wireless systems calls for an even more secure protocols and payment environment. Although the various security protocols available today boast of implementing the security requirements i.e. data confidentiality, integrity, non-repudiation, authentication and authorization, still the security of mcommerce transactions remain a major concern for mobile payment users. A number of m-commerce security techniques, models and protocols have been proposed by authors in recent past. This paper presents the recent advancements of the models and techniques authors proposed and the technologies and protocols used in these models. The paper also highlights the open areas of research in the field.


Sign in / Sign up

Export Citation Format

Share Document