دانلود و نمایش مقالات مرتبط با Elliptic curve::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Elliptic curve

تعداد مقالات یافته شده: 35
ردیف عنوان نوع
1 Authenticated Secure Quantum-Based Communication Scheme in Internet-of-Drones Deployment
طرح ارتباطی مبتنی بر کوانتومی ایمن در استقرار اینترنت پهپادها-2022
The rapid advance of manufacturing Unmanned Aerial Vehicles (UAVs, aka drones) has led to a rise in the use of their civilian and commercial applications. The access of these drones to controlled airspace can be efficiently coordinated through particular layered network architecture, often referred to as the Internet-of-Drones (IoD). The nature of IoD, which is deployed in an open-access environment, brings significant safety and security concerns. Classical cryptosystems such as elliptic curve cryptography, Rivest-Shamir-Adleman, and Diffie-Hellman are essential building blocks to secure communication in the IoD. However, with the rapid development of quantum computing, it will be easy to break public-key cryptosystems using efficient quantum algorithms like Shor’s algorithm. Thus, building quantum-safe solutions to enhance IoD security has become imperative. Fortunately, quantum technologies can provide unconditional security solutions to protect data and communications in the IoD environment. This paper proposes a quantum-based scheme to prevent unauthorized drones from accessing a specific flight zone and authenticates the identities and shared secret messages of involved entities. To do so, we used a quantum channel to encode the private information based on a pre-shared key and a random key generated in a session. The involved entities also perform mutual authentication and share a secret key. We also provide the security proofs and analysis of the proposed scheme that indicates its resistance to well-known attacks.
INDEX TERMS- Authentication | internet-of-drones | quantum-based communication | quantum cryptography.
مقاله انگلیسی
2 TNFS resistant families of pairing-friendly elliptic curves
خانواده های مقاوم TNFS منحنی بیضوی مناسب جفت شدن-2019
Recently there has been a significant progress on the tower number field sieve (TNFS) method, reducing the complexity of the discrete logarithm problem (DLP) in finite field extensions of composite degree. These new variants of the TNFS attacks have a major impact on pairing-based cryptography and particularly on the selection of the underlying elliptic curve groups and extension fields. In this paper we revise the criteria for selecting pairing-friendly elliptic curves considering these new TNFS attacks in finite extensions of composite embedding degree. Additionally we update the criteria for finite extensions of prime degree in order to meet today’s security requirements.
Keywords: Pairings | Elliptic curves | Pairing-friendly parameters | Embedding degree | TNFS attacks
مقاله انگلیسی
3 A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS
پروتکل احراز هویت متقابل منحنی بیضوی امن برای TMIS با کمک ابر-2019
With the fast progress of network communication, its technologies and the developing popularity of telecare medical information system (TMIS), doctors provide treatment to patients via Internet without visiting hospitals. By using mobile device, wireless body area network and cloud based architecture, the patients can gather their physiological information and upload to cloud via their mobile devices. The authenticated doctor provides online treatment to patient at anytime and anywhere. Moreover, TMIS maintains security and privacy of the patients in information communication and authenticated to all the participants before assessing this system. Recently Li et al. (2018) presented a cloud-assisted authentication and privacy preservation scheme for TMIS. They believed that their scheme secure against all well-known privacy and security attributes. In the proposed work, we reviewed Li et al. authentication protocol and found that it has various security flaws like as message authentication fails in healthcare center upload phase, session key is not possible in healthcare center upload phase, impersonation attack in patient data upload phase, patient anonymity and patient unlinkability. Further, we introduced enhance protocol in similar environment. The proposed protocol secure against man-in-the-middle attack, patient anonymity, replay attack, known-key security property, data confidentiality, data non-repudiation, message authentication, impersonation attack, session key security and patient unlinkability. We compared the proposed protocol with existing related protocols in same cloud based TMIS. The proposed protocol ensures of all desirable security prerequisites and managed the efficiency in terms of computation and communication costs for cloud-assisted TMIS.
Keywords: Cloud computing | Elliptic curve cryptography | TMIS | Medical data | Mutual authentication
مقاله انگلیسی
4 Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography
پروتکل احراز هویت کاربر از راه دور سبک وزن برای شبکه های 5G چند سرور با استفاده از رمزنگاری کلید عمومی عمومی خود گواهی شده-2019
Due to small cell deployments and multiple servers in 5G networks, a fast and anonymous mutual authentication protocol needs to be developed for complex 5G networks. In this paper, we propose a lightweight and untraceable authentication protocol for multi-server-based 5G networks. To reduce computational complexity, we employ selfcertified public key cryptography based on elliptic curve cryptography to authenticate the validation of users and servers. Without pairing operations, our scheme could improve performance efficiency. Also, a formal security model is designed to prove that our protocol is secure against forgery attack due to the discrete logarithm and the computational Diffie-Hellman problem. Performance analysis further shows that our protocol has a lower communication and computational overhead. Also, our protocol could support anonymous mutual authentication.
Keywords: Multi-server | Mutual authentication | Lightweight
مقاله انگلیسی
5 Privacy-preserving aggregation for cooperative spectrum sensing
تجمیع حفظ حریم خصوصی برای سنجش طیف تعاونی-2019
Cognitive radio technology has been proposed as a promising way to alleviate spectrum scarcity. In cognitive radio networks, cooperative spectrum sensing is an effective approach to improve spectrum-estimation accuracy. In this approach, a fusion center (FC) outsources sensing tasks to secondary users (SUs), and aggregates sensing reports provided by SUs to estimate spectrum availability. However, as sensing reports are highly correlated to SUs’ real locations, revealing sensing reports to an untrusted FC may incur a serious privacy threat for SUs. In this paper, we propose an efficient scheme that allows the FC to learn desired statistics from a group of SUs without compromising individual privacy. Moreover, the FC is still able to compute the sum over the remaining SUs when some SUs fail to submit their reports. Besides, to ensure secure communication in cooperative spectrum sensing, the proposed scheme verifies the legitimacy of SUs by utilizing the elliptic curve cryptography technique. The results of security analysis show that the proposed scheme achieves the combined objectives of privacy preservation, authentication, fault tolerance, and resistance to various types of attacks. Performance evaluation results demonstrate the feasibility and practicality of the proposed scheme.
Keywords: Cognitive radio networks | Cooperative spectrum sensing | Privacy preservation | Authentication | Fault tolerance | Elliptic curve cryptography
مقاله انگلیسی
6 EMOTE – Multilayered encryption system for protecting medical images based on binary curve
EMOTE - سیستم رمزگذاری چند لایه برای محافظت از تصاویر پزشکی بر اساس منحنی باینری-2019
Digital images used in business, government and medical sectors insist the need for image security against various threats. An exclusive system that can make use of color spaces has been proposed to process sensitive images based on the binary curve. The proposed Encryption systeM fOr proTecting imagEs has been coined as EMOTE. This multilayered system works on binary curves as binary operations have no carries. Since binary squaring is lightweight, it is claimed to be smaller and faster in hardware than prime-field ones. Logistic mapping has been done to perform chaotic masking, which is then followed by DNA encoding in the next layer. ECC over GF(2m) that works on the spatial domain has been chosen as it is one of the proven technique for its mathematical strength. This proposed system can facilitate both symmetric and asymmetric combination and hence hybrid. Experimental results and the histogram analysis obtained comprehend this proposed system for its extensive deployment to process sensitive images, especially in the medical domain. Ideal measures attained for MSE, PSNR values for the standard benchmark images taken from ‘‘The whole brain atlas” database from Harvard University, substantiate the proposed EMOTE system as an expedient choice for processing sensitive images.
Keywords: Elliptic curve cryptography | DNA encoding | Encryption | Decryption | Logistic Map
مقاله انگلیسی
7 An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach
رمزنگاری منحنی بیضوی مبتنی بر طرح احراز هویت متقابل برای ارتباطات شبکه هوشمند با استفاده از روش بیومتریک-2019
Smart grid (SG) provides a suitable adjustment in the amount of power generation by providing the ability to supervise consumer behavior. SG uses in the smart system to encourage cultural heritage because it is accountable for providing power without any interruption. SG is one of the vital components to authorize smart systems with a lot of smart features to attract visitors to come and visit heritage. In SG, environment security and privacy are the major concern for communications. An authentication protocol provides secure communication between users and service provider for security and privacy purpose. Several authentication protocols are available in the literature. However, they are enabled to known security attacks easily or they are not computationally efficient for SG communication. In the present paper, we design an ECC-based mutual authentication protocol for smart grid communication using biometric approach. The present framework satisfy various security features such as replay attack, user anonymity, man in the middle attack, key freshness, message authentication, session key agreement, impersonation attack, non-traceability and non-transferability. Further, the proposed protocol takes much less communication and computation costs compared with other existing protocols in SG environment. Therefore, our scheme is convenient for practical application in SG communication
Keywords: Biometric | Elliptic curve cryptography | Fuzzy extractor | Mutual authentication | Smart grid security and privacy
مقاله انگلیسی
8 Parallelizing pairings on Hessian elliptic curves
موازی سازی جفتی بر روی منحنی بیضوی هسیان-2019
This paper considers the computation of the Ate pairing on the Hessian model of elliptic curves. Due to the many important properties making the model attractive in cryptography, we compute for the first time the Ate pairing on this model and show how both the Tate and the Ate pairings can be parallelized on this curve. We wrote codes in the Sage software to ensure the correctness of formulas in this work.
Keywords: Hessian curves | Tate and ate pairings | Parallel computation
مقاله انگلیسی
9 An Efficient Identity-Based Signature Scheme without Bilinear Pairing for Vehicle-To-Vehicle Communication in VANETs
یک طرح امضایی مبتنی بر هویت کارآمد و بدون جفت دو طرفه برای ارتباط وسیله نقلیه به وسیله نقلیه در VANET-2019
Vehicles exchange traffic-related messages with neighboring vehicles to aid passengers and provide efficient traffic management. This is done via wireless communication channels in Vehicular Ad Hoc Networks (VANETs). Security and privacy issues are a major concern in VANETs. A typical attack consists of a malicious third party modifying and retransmitting intercepted messages. Current state of the art solutions enable a verifier to authenticate the source of received messages as well as to check their integrity before accepting them. However, these solutions do not adequately address the efficiency with which multiple messages are verified in VANETs deployed in high traffic density areas. Due to this, the computational load on a verifier is increased. In this paper, an efficient Identity-Based Signature with Conditional Privacy-Preserving Authentication (IBS-CPPA) scheme based on the Elliptic Curve Cryptography (ECC) and general one-way hash functions for V2V communication is proposed. This scheme supports the batch signature verification method, which enables each vehicle to authenticate a large number of messages at the same time. We provide a security proof of the proposed IBS-CPPA scheme in the random oracle model. The performance evaluation indicates that our scheme is more efficient in terms of computational cost with respect to similar schemes.
Keywords: Privacy-preservation | Identity-based cryptography | Bilinear pairing | Computational cost
مقاله انگلیسی
10 An efficient Elman neural network classifier with cloud supported internet of things structure for health monitoring system
یک طبقه بندی کارآمد شبکه عصبی Elman با ساختار اینترنت اشیاء با پشتیبانی ابری برای سیستم نظارت بر سلامت-2019
To improve the strain on healthcare systems which happens through an aging population and a rise in chronic illness, Internet of Things (IoT) technology has attracted much attention in recent years. Cloud computing along with the IoT concept is a novel trend, for an efficient management and online process- ing of sensor data, and its major problem is the protection of privacy. Normally, the data is acquired from the users (i.e. patients) by the healthcare service provider and distributes them with authorized clinics or healthcare experts and these details were distributed to both pharmaceutical and life health insur- ance companies. Additionally the hackers have susceptible about the data of the patient, at the time of synchronization or cloud transfer is happening with the devices that are interconnected. An efficient El- man Neural Network (ENN) classifier based data protection is given in this work, which forms the cryp- tography and authentication. This suggested work has two varieties of process namely client side and cloud side. In client side, initially, the EEG signal is obtained from human and is processed with the help of the Hyper analytic Wavelet Transform (HWT) with Adaptive Noise Cancellation (ANC) method. Then, through the Elliptic Curve Cryptography (ECC) scheme, signal is safeguarded from forgery. The features were drawn-out from authenticated information in cloud side, and these details were divided as abnor- mal or not. The appropriateness of this work is validated by executing the technique called One Class Support Vector Machine (OCSVM) with IoT that drivens the ECG-dependent health monitoring system in the cloud on both experimental analysis and simulation.
Keywords: IoT | Cloud computing | Elman neural network | Hyper analytic wavelet transform | Adaptive noise cancellation | Elliptic curve cryptography | SVM
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 3364 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 3364 :::::::: افراد آنلاین: 70