دانلود و نمایش مقالات مرتبط با Elliptic curve cryptography (ECC)::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Elliptic curve cryptography (ECC)

تعداد مقالات یافته شده: 10
ردیف عنوان نوع
1 An Efficient Identity-Based Signature Scheme without Bilinear Pairing for Vehicle-To-Vehicle Communication in VANETs
یک طرح امضایی مبتنی بر هویت کارآمد و بدون جفت دو طرفه برای ارتباط وسیله نقلیه به وسیله نقلیه در VANET-2019
Vehicles exchange traffic-related messages with neighboring vehicles to aid passengers and provide efficient traffic management. This is done via wireless communication channels in Vehicular Ad Hoc Networks (VANETs). Security and privacy issues are a major concern in VANETs. A typical attack consists of a malicious third party modifying and retransmitting intercepted messages. Current state of the art solutions enable a verifier to authenticate the source of received messages as well as to check their integrity before accepting them. However, these solutions do not adequately address the efficiency with which multiple messages are verified in VANETs deployed in high traffic density areas. Due to this, the computational load on a verifier is increased. In this paper, an efficient Identity-Based Signature with Conditional Privacy-Preserving Authentication (IBS-CPPA) scheme based on the Elliptic Curve Cryptography (ECC) and general one-way hash functions for V2V communication is proposed. This scheme supports the batch signature verification method, which enables each vehicle to authenticate a large number of messages at the same time. We provide a security proof of the proposed IBS-CPPA scheme in the random oracle model. The performance evaluation indicates that our scheme is more efficient in terms of computational cost with respect to similar schemes.
Keywords: Privacy-preservation | Identity-based cryptography | Bilinear pairing | Computational cost
مقاله انگلیسی
2 An efficient Elman neural network classifier with cloud supported internet of things structure for health monitoring system
یک طبقه بندی کارآمد شبکه عصبی Elman با ساختار اینترنت اشیاء با پشتیبانی ابری برای سیستم نظارت بر سلامت-2019
To improve the strain on healthcare systems which happens through an aging population and a rise in chronic illness, Internet of Things (IoT) technology has attracted much attention in recent years. Cloud computing along with the IoT concept is a novel trend, for an efficient management and online process- ing of sensor data, and its major problem is the protection of privacy. Normally, the data is acquired from the users (i.e. patients) by the healthcare service provider and distributes them with authorized clinics or healthcare experts and these details were distributed to both pharmaceutical and life health insur- ance companies. Additionally the hackers have susceptible about the data of the patient, at the time of synchronization or cloud transfer is happening with the devices that are interconnected. An efficient El- man Neural Network (ENN) classifier based data protection is given in this work, which forms the cryp- tography and authentication. This suggested work has two varieties of process namely client side and cloud side. In client side, initially, the EEG signal is obtained from human and is processed with the help of the Hyper analytic Wavelet Transform (HWT) with Adaptive Noise Cancellation (ANC) method. Then, through the Elliptic Curve Cryptography (ECC) scheme, signal is safeguarded from forgery. The features were drawn-out from authenticated information in cloud side, and these details were divided as abnor- mal or not. The appropriateness of this work is validated by executing the technique called One Class Support Vector Machine (OCSVM) with IoT that drivens the ECG-dependent health monitoring system in the cloud on both experimental analysis and simulation.
Keywords: IoT | Cloud computing | Elman neural network | Hyper analytic wavelet transform | Adaptive noise cancellation | Elliptic curve cryptography | SVM
مقاله انگلیسی
3 Error analysis and detection procedures for elliptic curve cryptography
روشهای تجزیه و تحلیل خطا و روشهای تشخیص رمزنگاری منحنی بیضوی-2019
In this paper, a fault detection scheme is introduced with the ability to perform with increased protection and reliability of the Elliptic Curve Cryptography (ECC) in realistic environments at a competitive price point. Fall of errors in encrypted/decrypted data delivery with the transmission can create the situation of erroneous data occurring. Without fault detection, in the context of encryption as well as decryption process can create the unprotected system due to random faults, and vulnerable to attack. We are striving to overcome these system weaknesses by introducing the application of nonlinear fault detection codes as it allows safeguarding the elliptic curve point while adding and doubling the operations from the fault attacks. The use of these codes ensures almost perfect error discovery capacity with a reasonably priced upfront cost. The ECC cryptosystem offered a failsafe fault detection scheme using an error detecting code with a proven rate of 99% fault detection coverage.
Keywords: Elliptic Curve Cryptography | Fault attack | Fault detection
مقاله انگلیسی
4 A secure authentication protocol for wearable devices environment using ECC
پروتکل احراز هویت مطمئن برای محیط دستگاه های پوشیدنی با استفاده از ECC-2019
One of the challenging issues in wearable devices environment is to provide a secure communication. User authentication is a mechanism which is used to provide the secure communication in this envi- ronment. In this paper, we propose an authentication protocol for wearable devices environment using elliptic curve cryptography (ECC). We analyze the formal security of our scheme using random oracle model and discuss its informal security analysis to show that it is resistant to various known attacks. We formally verify its security using the ProVerif tool. Our scheme performs better than the existing related schemes in terms of security features and communication cost.
Keywords: Authentication | Wearable devices | Denial of service attack | Session key | Mobile terminal stolen attack | ECC
مقاله انگلیسی
5 Lightweight privacy-preserving power injection and communication over vehicular networks and 5G smart grid slice with provable security
تزریق برق و ارتباط برقراری ارتباط سبک وزن سبک و برق از طریق شبکه های وسایل نقلیه و برش شبکه هوشمند 5G با امنیت قابل اثبات-2019
In vehicle-to-grid (V2G) network, electric vehicles (EVs) can store greenpower from re- newable energy sources and inject excess power to the grid during the peak hours for monetary benefits. Since transactions are involved in this process, it is pertinent to secure any transmitted packet and protect users’ privacy to ensure fairness in the energy market and combat any privacy issues that can expose the users’ energy profile and hinder the deployment of autonomous vehicle networks (AVNs). In this research article, a lightweight privacy-aware power injection and communication (LPPC) scheme suitable for deployment over vehicular networks and 5G smart grid slice is proposed. In LPPC, each EV prepares its bids and computes two secret keys shared with the utility company and gateway to blind the bids for different time slots. A novel aggregation technique based on elliptic curve cryptography (ECC) is utilized to aggregate the blinded bids. A hash function-based technique which allows the utility company to verify the authenticity and integrity of the aggregated bid while concealing the individual bids is developed. We demonstrate the se- curity of LPPC in the random oracle model based on the intractability of the computational Diffie–Hellman and Discrete Logarithm problems. Our analysis shows that LPPC can protect the individual bids and achieve secure vehicular communication. The performance evalua- tion shows that LPPC is much more efficient than the state-of-the-art schemes.
Keywords: Vehicle-to-grid network | Power injection | Autonomous vehicle network | Elliptic curve cryptography | Privacy | Electric vehicle | Random oracle| Aggregation |Energy profile
مقاله انگلیسی
6 A lightweight CLAS scheme with complete aggregation for healthcare mobile crowdsensing
یک طرح CLAS سبک وزن با تجمیع کامل برای سنجش جمعیت سیار مراقبت های بهداشتی-2019
The vast increase in the deployment of smart devices and the ubiquity of the Internet have evolved a new technology referred to as mobile crowdsensing (MCS). In healthcare MCS (HMCS), mobile devices can collect and upload medical data to the cloud server where authorized healthcare providers can access the relevant data for proper diagnosis and treatments. However, since this process is directly connected with patient’s sensitive health information, any unauthorized disclosure may have serious consequences on the patient’s wellbeing, hence privacy and security are serious issues in HMCS. To achieve data privacy and integrity, some certificateless aggregate signature (CLAS) schemes have been proposed. Very recently, four independent CLAS schemes were proposed for healthcare application. The authors claimed that their schemes were semantically secure in the security model. In this work, we analyze these schemes and find them to be insecure since there exists an adversary who can always forge a valid signature. Afterwards, we put forward a new CLAS scheme for HMCS application based on Elliptic Curve Cryptography (ECC) and hash function. In the proposed scheme, an aggregator can perform complete aggregation of certificateless signatures, resulting in improved performance. The proposed scheme satisfies all the security and privacy requirements of HMCS and can prevent possible attacks. Moreover, we show that the scheme is semantically secure with the assumption that the Discrete Logarithm Problem (DLP) is intractable. Extensive performance analysis and comparison show that the scheme is much more efficient than the state-of-the-art schemes.
Keywords: Healthcare | Mobile crowdsensing | Privacy | Elliptic curve cryptography | Certificateless aggregate signature | Discrete Logarithm Problem (DLP) | Aggregation
مقاله انگلیسی
7 Generic cost optimized and secured sensitive attribute storage model for template based text document on cloud
هزینه کلی مدل ذخیره سازی ویژگی های حساس بهینه سازی شده و امن برای سند متن متنی مبتنی بر الگو بر روی ابر-2019
Cloud computing stands as the most powerful technology for providing and managing resources as a pay-per-usage system. Nowadays, user documents are stocked in the cloud for easy access, less maintenance cost, and better services, etc. Currently, user data stocked up in the cloud are mostly in the form of template-based unstructured text documents. These documents are stocked up in a group by various organizations. Generally, the template-based text document contains large size common information, common terms, conditions, and sensitive information. For protecting the values in the documents, present methods apply encryption algorithms. But these techniques take high encryption time and required more storage space. Applying encryption algorithms is an extremely time-consuming task since the terms and conditions and instructions are common for all documents, and they don’t require any security. But the sensitive information in these documents differs as of one user to another user and as well this sensitive information requires protection. Therefore, there is a requirement for an efficient way of segregating, storing and encrypting sensitive information with minimum storage cost, and computational cost. To tackle these issues, a generic safe data storage model is proposed, which makes use of information extraction techniques of Natural Language Processing for sensitive attribute value identification, and Enhanced ECC for securing sensitive data centered on group key. When weighted against the existing entire document and partition-based encryption technique, the proposed generic secure data storage model for cloud takes lesser encryption time and storage space.
Keywords : Template based Text Document | Data Security | Security for Sensitive Data | Secure Data Storage Model for Cloud | Common Template | Common Terms and Conditions | Elliptic Curve Cryptography (ECC) | Enhanced Elliptic Curve Cryptography (EECC)
مقاله انگلیسی
8 Balancing elliptic curve coprocessors from bottom to top
متعادل کننده پردازشگرهای منحنی بیضوی از پایین به بالا-2019
In 2016, Renes et al. were the first to propose complete addition formulas for Elliptic Curve Cryptogra- phy (ECC) on Weierstrass curves. With these formulas, the same set of equations can be used for point addition and point doubling, which makes software and hardware implementations less vulnerable to side-channel (SCA) attacks. Further, all inputs are valid, so there is no need for conditional statements handling special cases such as the point at infinity. This paper presents the first ASIC design of the complete addition formulas of Renes et al. Each com- putation layer in the design is balanced, from the field arithmetic to the point multiplication. The design explores two datapaths: a full-width Montgomery Multiplier ALU (MMALU) with a built-in adder and a serialized version of the MMALU. The interface sizes of the MMALU are optimized through an explo- ration of the design parameters. The register file size is minimized through an optimal scheduling of the modular operations. The top-level point multiplication is implemented using the Montgomery ladder algorithm, with the additional option of randomizing the execution order of the point operations as a countermeasure against SCA attacks. The implementation results after synthesis are generated using the open source NANGATE45 library.
Keywords: ASIC Weierstrass curve | Complete addition formulas | Elliptic curve cryptography (ECC) | Side-channel analysis (SCA) | Simple power analysis (SPA)| Differential power analysis (DPA) | Montgomery ladder
مقاله انگلیسی
9 طرح امضای بدون گواهی امن عاری از جفت‌شدگی و قابل‌اعتماد
سال انتشار: 2018 - تعداد صفحات فایل pdf انگلیسی: 18 - تعداد صفحات فایل doc فارسی: 37
طرح امضاء بدون گواهی (CLS) یک روش رمزنگاری قابل‌توجه برای حل مسئله امان سپاری کلیدی در رمزنگاری مبتنی بر هویت (IBC) است. در CLS، کلید خصوصی به‌طورکلی توسط مرکز تولید کلید (KGC) و امضاء کننده محاسبه می‌شود که تضمین می‌کند که هیچ KGC انتقامی، امضای واقعی را جعل نمی‌کند. به‌تازگی تعدادی از طرح‌های CLS با استفاده از جفت سازی دوخطی ارائه شده‌اند و ایمنی آن‌ها را با استفاده از مدل امنیتی استاندارد نشان می‌دهد. به‌خوبی مشخص شده است که یکی از این عملیات جفت سازی نیاز به هزینه‌های محاسباتی بسیار بیشتری نسبت به سایر عملیات رمزنگاری دارد. در این مقاله، ما یک طرح CLS جدید با استفاده از رمزنگاری منحنی بیضوی (ECC) پیشنهاد می‌کنیم که نیازی به عمل جفت سازی دوخطی ندارد. طرح CLS ما به صورت رسمی مورد تجزیه‌وتحلیل قرار گرفته است و ثابت شده است بر اساس عدم قطعیت یك مسئله لگاریتم گسسته منحنی بیضوی (ECDLP) تحت مدل اوراکل تصادفی در برابر حملات نوع I و نوع II امن است. ارزیابی عملکرد نشان می‌دهد که طرح CLS پیشنهادی از سایر طرح‌های CLS رقابتی بهتر است.
واژه‌های کليدی: امضاي ديجيتال | منحني بيضوی | رمزنگاري بدون گواهي | مدل اوراکل تصادفي | امنيت قابل‌اعتماد.
مقاله ترجمه شده
10 A lightweight attribute-based encryption scheme for the Internet of Things
طرح رمزگذاری سبک مبتنی بر ویژگی برای اینترنت اشیاء-2015
Article history:Received 30 April 2014 Received in revised form 2 August 2014Accepted 8 October 2014Available online 18 October 2014Keywords:Internet of Things Attribute-based encryption Elliptic curve cryptographyDecision Diffie–Hellman problem Selective-set modelInternet of Things (IoT) is an emerging network paradigm, which realizes the interconnections among the ubiquitous things and is the foundation of smart society. Since IoT are always related to user’s daily life or work, the privacy and security are of great importance. The pervasive, complex and heterogeneous properties of IoT make its security issues very challenging. In addition, the large number of resources- constraint nodes makes a rigid lightweight requirement for IoT security mechanisms. Presently, the attribute-based encryption (ABE) is a popular solution to achieve secure data transmission, storage and sharing in the distributed environment such as IoT. However, the existing ABE schemes are based on expensive bilinear pairing, which make them not suitable for the resources-constraint IoT applications. In this paper, a lightweight no-pairing ABE scheme based on elliptic curve cryptography (ECC) is proposed to address the security and privacy issues in IoT. The security of the proposed scheme is based on the ECDDH assumption instead of bilinear Diffie–Hellman assumption, and is proved in the attribute based selective-set model. By uniformly determining the criteria and defining the metrics for measuring the communication overhead and computational overhead, the comparison analyses with the existing ABE schemes are made in detail. The results show that the proposed scheme has improved execution efficiency and low communication costs. In addition, the limitations and the improving directions of it are also discussed in detail.© 2014 Elsevier B.V. All rights reserved.
Keywords: Internet of Things | Attribute-based encryption | Elliptic curve cryptography | Decision Diffie–Hellman problem | Selective-set model
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 3337 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 3337 :::::::: افراد آنلاین: 77