دانلود و نمایش مقالات مرتبط با رمزنگاری منحنی بیضوی::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - رمزنگاری منحنی بیضوی

تعداد مقالات یافته شده: 24
ردیف عنوان نوع
1 A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS
پروتکل احراز هویت متقابل منحنی بیضوی امن برای TMIS با کمک ابر-2019
With the fast progress of network communication, its technologies and the developing popularity of telecare medical information system (TMIS), doctors provide treatment to patients via Internet without visiting hospitals. By using mobile device, wireless body area network and cloud based architecture, the patients can gather their physiological information and upload to cloud via their mobile devices. The authenticated doctor provides online treatment to patient at anytime and anywhere. Moreover, TMIS maintains security and privacy of the patients in information communication and authenticated to all the participants before assessing this system. Recently Li et al. (2018) presented a cloud-assisted authentication and privacy preservation scheme for TMIS. They believed that their scheme secure against all well-known privacy and security attributes. In the proposed work, we reviewed Li et al. authentication protocol and found that it has various security flaws like as message authentication fails in healthcare center upload phase, session key is not possible in healthcare center upload phase, impersonation attack in patient data upload phase, patient anonymity and patient unlinkability. Further, we introduced enhance protocol in similar environment. The proposed protocol secure against man-in-the-middle attack, patient anonymity, replay attack, known-key security property, data confidentiality, data non-repudiation, message authentication, impersonation attack, session key security and patient unlinkability. We compared the proposed protocol with existing related protocols in same cloud based TMIS. The proposed protocol ensures of all desirable security prerequisites and managed the efficiency in terms of computation and communication costs for cloud-assisted TMIS.
Keywords: Cloud computing | Elliptic curve cryptography | TMIS | Medical data | Mutual authentication
مقاله انگلیسی
2 Privacy-preserving aggregation for cooperative spectrum sensing
تجمیع حفظ حریم خصوصی برای سنجش طیف تعاونی-2019
Cognitive radio technology has been proposed as a promising way to alleviate spectrum scarcity. In cognitive radio networks, cooperative spectrum sensing is an effective approach to improve spectrum-estimation accuracy. In this approach, a fusion center (FC) outsources sensing tasks to secondary users (SUs), and aggregates sensing reports provided by SUs to estimate spectrum availability. However, as sensing reports are highly correlated to SUs’ real locations, revealing sensing reports to an untrusted FC may incur a serious privacy threat for SUs. In this paper, we propose an efficient scheme that allows the FC to learn desired statistics from a group of SUs without compromising individual privacy. Moreover, the FC is still able to compute the sum over the remaining SUs when some SUs fail to submit their reports. Besides, to ensure secure communication in cooperative spectrum sensing, the proposed scheme verifies the legitimacy of SUs by utilizing the elliptic curve cryptography technique. The results of security analysis show that the proposed scheme achieves the combined objectives of privacy preservation, authentication, fault tolerance, and resistance to various types of attacks. Performance evaluation results demonstrate the feasibility and practicality of the proposed scheme.
Keywords: Cognitive radio networks | Cooperative spectrum sensing | Privacy preservation | Authentication | Fault tolerance | Elliptic curve cryptography
مقاله انگلیسی
3 EMOTE – Multilayered encryption system for protecting medical images based on binary curve
EMOTE - سیستم رمزگذاری چند لایه برای محافظت از تصاویر پزشکی بر اساس منحنی باینری-2019
Digital images used in business, government and medical sectors insist the need for image security against various threats. An exclusive system that can make use of color spaces has been proposed to process sensitive images based on the binary curve. The proposed Encryption systeM fOr proTecting imagEs has been coined as EMOTE. This multilayered system works on binary curves as binary operations have no carries. Since binary squaring is lightweight, it is claimed to be smaller and faster in hardware than prime-field ones. Logistic mapping has been done to perform chaotic masking, which is then followed by DNA encoding in the next layer. ECC over GF(2m) that works on the spatial domain has been chosen as it is one of the proven technique for its mathematical strength. This proposed system can facilitate both symmetric and asymmetric combination and hence hybrid. Experimental results and the histogram analysis obtained comprehend this proposed system for its extensive deployment to process sensitive images, especially in the medical domain. Ideal measures attained for MSE, PSNR values for the standard benchmark images taken from ‘‘The whole brain atlas” database from Harvard University, substantiate the proposed EMOTE system as an expedient choice for processing sensitive images.
Keywords: Elliptic curve cryptography | DNA encoding | Encryption | Decryption | Logistic Map
مقاله انگلیسی
4 An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach
رمزنگاری منحنی بیضوی مبتنی بر طرح احراز هویت متقابل برای ارتباطات شبکه هوشمند با استفاده از روش بیومتریک-2019
Smart grid (SG) provides a suitable adjustment in the amount of power generation by providing the ability to supervise consumer behavior. SG uses in the smart system to encourage cultural heritage because it is accountable for providing power without any interruption. SG is one of the vital components to authorize smart systems with a lot of smart features to attract visitors to come and visit heritage. In SG, environment security and privacy are the major concern for communications. An authentication protocol provides secure communication between users and service provider for security and privacy purpose. Several authentication protocols are available in the literature. However, they are enabled to known security attacks easily or they are not computationally efficient for SG communication. In the present paper, we design an ECC-based mutual authentication protocol for smart grid communication using biometric approach. The present framework satisfy various security features such as replay attack, user anonymity, man in the middle attack, key freshness, message authentication, session key agreement, impersonation attack, non-traceability and non-transferability. Further, the proposed protocol takes much less communication and computation costs compared with other existing protocols in SG environment. Therefore, our scheme is convenient for practical application in SG communication
Keywords: Biometric | Elliptic curve cryptography | Fuzzy extractor | Mutual authentication | Smart grid security and privacy
مقاله انگلیسی
5 An efficient Elman neural network classifier with cloud supported internet of things structure for health monitoring system
یک طبقه بندی کارآمد شبکه عصبی Elman با ساختار اینترنت اشیاء با پشتیبانی ابری برای سیستم نظارت بر سلامت-2019
To improve the strain on healthcare systems which happens through an aging population and a rise in chronic illness, Internet of Things (IoT) technology has attracted much attention in recent years. Cloud computing along with the IoT concept is a novel trend, for an efficient management and online process- ing of sensor data, and its major problem is the protection of privacy. Normally, the data is acquired from the users (i.e. patients) by the healthcare service provider and distributes them with authorized clinics or healthcare experts and these details were distributed to both pharmaceutical and life health insur- ance companies. Additionally the hackers have susceptible about the data of the patient, at the time of synchronization or cloud transfer is happening with the devices that are interconnected. An efficient El- man Neural Network (ENN) classifier based data protection is given in this work, which forms the cryp- tography and authentication. This suggested work has two varieties of process namely client side and cloud side. In client side, initially, the EEG signal is obtained from human and is processed with the help of the Hyper analytic Wavelet Transform (HWT) with Adaptive Noise Cancellation (ANC) method. Then, through the Elliptic Curve Cryptography (ECC) scheme, signal is safeguarded from forgery. The features were drawn-out from authenticated information in cloud side, and these details were divided as abnor- mal or not. The appropriateness of this work is validated by executing the technique called One Class Support Vector Machine (OCSVM) with IoT that drivens the ECG-dependent health monitoring system in the cloud on both experimental analysis and simulation.
Keywords: IoT | Cloud computing | Elman neural network | Hyper analytic wavelet transform | Adaptive noise cancellation | Elliptic curve cryptography | SVM
مقاله انگلیسی
6 An area-efficient bit-serial sequential polynomial basis finite field GF(2m) multiplier
An area-efficient bit-serial sequential polynomial basis finite field GF(2m) multiplier-2019
Many cryptographic and error control coding algorithms rely on finite field arithmetic. Hardware implementation of these algorithms requires an efficient realization of finite field GF(2m) arithmetic operations. Finite field multiplication is complex among the basic arithmetic operations, and it is employed in field exponentiation and inversion operations. Various algorithms and architectures are proposed in the literature for hardware implementation of finite field multiplication to achieve a reduction in area and delay. In this paper, a modified interleaved modular reduction multiplication algorithm and its bit-serial sequential architecture are proposed. It is observed from the comparison of analytical results that the proposed architecture achieves the reduction in area and area-delay product compared to the existing multipliers. The proposed multiplier achieves an improvement of 39% in area and 17% in area-delay product estimations for field order of 409 when compared with the best sequential multiplier available in the literature. Application specific integrated circuit (ASIC) implementation of the proposed multiplier together with the two most comparable multipliers confirms that the proposed multiplier outperforms in terms of area and area-delay product. The proposed multiplier is suitable for implementation of security in Internet of Things (IoT) gateways and edge-devices.
Keywords: Finite field arithmetic | Polynomial basis | Bit-serial multiplier | Elliptic curve cryptography | Internet of Things (IoT)
مقاله انگلیسی
7 An efficient privacy-preserving protocol for database-driven cognitive radio networks
یک پروتکل موثر برای حفظ حریم خصوصی برای شبکه های رادیویی شناختی محور از پایگاه داده-2019
Cognitive radio is regarded as a promising technology for remedying spectrum shortage and improving spectrum utilization. However, database-driven cognitive radio networks (CRNs) are vulnerable to a series of security attacks and privacy threats, especially the privacy breach of secondary users (SUs). In this paper, we propose an efficient privacy-preserving protocol to protect the identity and trajectory privacy of each SU and to prevent the database (DB) from tracing any SU. Besides, this paper also aims at improving the efficiency of authentication and channel allocation to offer the best connectivity to SUs wherever they are and at any time. Taking advantage of the elliptic curve cryptography technique, our protocol achieves the mutual authentication between SUs and base stations (BSs), which enhances the security of CRNs communication. Based on channel pre-allocation to BSs, our protocol reduces the latency of obtaining available channels for SUs. Moreover, our protocol exploits reputation to motivate SUs to be honest and thus increases the utilization of the limited spectrum resources. The results of security analysis show that our protocol provides strong privacy preservation for SUs that the DB cannot get the entire trajectory of any SU, even the DB colludes with all BSs. Furthermore, the results also show that the proposed protocol can resist various types of attacks. The results of performance evaluation indicate the efficiency of the proposed privacy-preserving protocol.
Keywords: Cognitive radio networks | Privacy-preserving | Authentication | Elliptic curve cryptography | Reputation
مقاله انگلیسی
8 Enhanced authentication and key management scheme for securing data transmission in the internet of things
تصدیق پیشرفته و برنامه مدیریت کلیدی برای اطمینان از انتقال داده ها در اینترنت اشیا-2019
The Internet of Things (IoT), with its smartness and intelligence, is gradually changing human life by al- lowing everyday objects to be connected to the Internet. With the prevalence of the IoT, wireless sensor networks (WSNs) are attracting worldwide attention, because they cover a wide range of IoT applica- tions. The sensors collect data from the physical world and communicate with each other through wire- less links. Ensuring the security and privacy of WSNs’ communication is challenging. Recently, a secure authentication and key management scheme was proposed to secure data transmission in WSNs. In this paper, we show that this scheme has various security flaws, such as replay attack, denial of service attack, impersonation attack, and lack of mutual authentication and session key agreement. Then, we propose an enhanced scheme to overcome the identified security weaknesses. The security of the enhanced scheme is formally verified using the Burrows–Abadi–Needham logic and the Automated Validation of Internet Security Protocols and Applications tool. Our proposed scheme is more secure, efficient, and suitable for WSN-based IoT applications than recent related methods.
Keywords: Privacy | Mutual authentication | Key agreement | Elliptic curve cryptography | BAN logic | AVISPA
مقاله انگلیسی
9 Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber–physical systems
برون سپاری مبتنی بر پروکسی مبتنی بر هویت با ممیزی عمومی در سیستم های سایبر فیزیکی پزشکی مبتنی بر ابر-2019
Cloud-based medical cyber–physical system (MCPS) relies on cloud computing to provide powerful data storage and computing services. Based on the vital outsourced medical data, doctors can perform precise medical diagnosis for patients, thus the integrity verification of medical data has become increasingly important. In this paper, we propose an identity-based proxy-oriented outsourcing with public auditing scheme in cloudbased MCPS using elliptic curve cryptography. Our scheme enables a patient to authorize the proxy to generate and upload the signatures of medical data and corresponding encrypted medical data to cloud-based MCPS. Any third party auditor (TPA) can audit the medical data efficiently, without retrieving the entire medical data set. We provide the security proof of the proposed scheme, including the storage correctness guarantee and proxy-oriented privacy-preserving property. Moreover, our scheme is designed on identity-based systems, which can avoid complex certificates management. The efficiency comparison shows that our scheme is much more light-weight, and more suitable in cloud-based MCPS.
Keywords: Cloud computing | Identity-based proxy-oriented outsourcing | Medical cyber–physical system | Elliptic curve cryptography | Public auditing
مقاله انگلیسی
10 An efficient CPPA scheme for intelligent transportation networks
یک طرح کارآمد CPPA برای شبکه های حمل و نقل هوشمند-2019
To defend intelligent transportation networks’ security and privacy, existing standards employ the Public Key Infrastructure (PKI) authentication framework. However, the high associated PKI computation and communication overheads break ground for utilizing an alternative candidate, the Identity-based Cryptographic (IBC) authentication. Most of the underlined calculations of the IBC approaches rely on the elliptic curves’ pairing operation. Since the pairing function is a complex and computation intensive operation, several studies have developed pairingless IBC authentications and applied the hardware security of tamper-proof devices to secure the cryptographic parameters at user-end. Motivated by this trend, we compose a Pairingless Modified Efficient Conditional Privacy- Preserving Authentication Scheme (PME-CPPAS). Our scheme omits the utilization of the complex pairing operation as well as the demand for expensive tamper-proof devices. When analyzing the performance of the presented design, its effectiveness, in comparison to the available pairing-based and pairingless approaches, is proved in terms of computation complexity, communication overhead, and storage overhead. PME-CPPAS achieves less signing computational cost and comparable verification computational performance.
Keywords: Intelligent transportation/vehicular | networks | Authentication | Conditional privacy | Elliptic curve cryptography | Identity-based signature | Bilinear pairings | Tamper-proof device
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 3183 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 3183 :::::::: افراد آنلاین: 63