The document proposes an efficient and secure identity-based group signature scheme using bilinear pairings. The scheme allows any member of a group to sign messages anonymously on behalf of the group. The group manager can trace signatures to reveal the identity of the signer. The scheme is based on the computational Diffie-Hellman problem and bilinear pairings. It improves upon previous schemes by making the group public key and signature length independent of the number of group members. The proposed scheme consists of setup, extract, join, sign, verify, and open procedures. Security and efficiency analyses show the scheme satisfies security properties under the assumption that the underlying problem is hard.
A New Key Agreement Protocol Using BDP and CSP in Non Commutative GroupsEswar Publications
The available key agreement schemes using number theoretic, elliptic curves etc are common for cryptanalysts and associated security is vulnerable. This vulnerability further increases when we talk about modern efficient computers. So there is a need of providing new mechanism for key agreement with different properties so intruders get surprised and communication scenarios becomes stronger than before. In this paper, we propose a key agreement protocol which works in a non commutative group. We prove that our protocol meets the desired security attributes under the assumption that Conjugacy Search Problem and Decomposition Problem are hard in non commutative groups.
Analysis and improvement of pairing free certificate-less two-party authentic...ijsptm
The predominant grid authentication mechanisms use public key infrastructure (PKI). Nonetheless,
certificate-less public key cryptography (CL-PKC) has several advantages that seem to well align with the
demands of grid computing. Security and efficiency are the main objectives of grid authentication
protocols. Unfortunately, certificate-less authenticated key agreement protocols rely on the bilinear
pairing, that is extremely computational expensive. In this paper, we analyze the recently secure certificateless
key agreement protocols without pairing. We then propose a novel grid pairing-free certificate-less
two-party authenticated key agreement (GPC-AKA) protocol, providing a more lightweight key
management approach for grid users. We also show, a GPC-AKA security protocol proof using formal
automated security analysis Sycther tool.
Proactive Secret Sharing using a Trivariate PolynomialIJERA Editor
Secret sharing technique is a tool in cryptography which refers to distribution of a secret data among a group of
n participants .The secret can be reconstructed by combining the individual share. To reconstruct secret,
minimum of any t threshold subgroup or more shares are combined together. By secret sharing technique we can
acquire secured and decentralized communication. The shares of the participants may be compromised because
of huge exchange of messages. Secret sharing technique can be easily implemented by using polynomials. We
propose a proactive secret sharing scheme, where shares are distributed and renewed periodically without
changing the secret. This scheme also allows us to reconstruct and recover the share if share is lost. The share
can also be verified to ensure its validity. Major contribution of the paper is implementing Proactive secret
sharing scheme using Elliptic Curve cryptography and Trivariate polynomial [1].
EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITYIJNSA Journal
In a proxy re-encryption (PRE) scheme, Alice gives a special information to a proxy that allows it to transform messages encrypted under Alice's public key into a encryption under Bob's public key such that the message is not revealed to the proxy. In [14], Jian Weng and others introduced the notion of conditional proxy re-encryption (C-PRE) with bilinear pairings. Later, a break for the same was published in [17] and a new C-PRE scheme with bilinear pairings was introduced. In C-PRE, the proxy also needs to have the right condition key to transform the ciphertext (associated with a condition set by Alice) under Alice's public key into ciphertext under Bob's public key, so that Bob can decrypt it. In this paper, we propose an efficient C-PRE scheme which uses substantially less number of bilinear pairings when compared to the existing one [17]. We then prove its chosen-ciphertext security under modified Computational Diffie-Hellman (mCDH) and modified Computational Bilinear Diffie-Hellman (mCBDH) assumptions in the random oracle model.
Using NP Problems to Share Keys in Secret-Key Cryptographyiosrjce
Public key cryptography has now become an important means for providing confidentiality by its use
of key distribution, in which users can do private communication with the help of encryption keys. It also
provides digital signatures which allow users to sign keys to verify their identities. But public key cryptography
has its own shortcoming regarding to high cost in keys distribution and excessive computation in encoding and
decoding it.
Whereas private key can omit all above problems but only if we can find a way to share private key
confidentially.
This research presents an innovation, which can be our future approach, using technology so-called NP
problems, of sending or sharing keys to the receiver without any need of the third party. This will provide an
open idea where sender and receiver can share any key for any number of times for encrypting data
confidentially that also helpful in overcoming problem of brute force attack
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...CSCJournals
Cryptography has several important aspects in supporting the security of the data, which
guarantees confidentiality, integrity and the guarantee of validity (authenticity) data. One of the
public-key cryptography is the RSA cryptography. The greater the size of the modulus n, it will be
increasingly difficult to factor the value of n. But the flaws in the RSA algorithm is the time
required in the decryption process is very long. Theorem used in this research is the Chinese
Remainder Theorem (CRT). The goal is to find out how much time it takes RSA-CRT on the size
of modulus n 1024 bits and 4096 bits to perform encryption and decryption process and its
implementation in Java programming. This implementation is intended as a means of proof of
tests performed and generate a cryptographic system with the name "RSA and RSA-CRT Text
Security". The results of the testing algorithm is RSA-CRT 1024 bits has a speed of
approximately 3 times faster in performing the decryption. In testing the algorithm RSA-CRT 4096
bits, the conclusion that the decryption process is also effective undertaken more rapidly.
However, the flaws in the key generation process and the RSA 4096 bits RSA-CRT is that the
time needed is longer to generate the keys.
A New Key Agreement Protocol Using BDP and CSP in Non Commutative GroupsEswar Publications
The available key agreement schemes using number theoretic, elliptic curves etc are common for cryptanalysts and associated security is vulnerable. This vulnerability further increases when we talk about modern efficient computers. So there is a need of providing new mechanism for key agreement with different properties so intruders get surprised and communication scenarios becomes stronger than before. In this paper, we propose a key agreement protocol which works in a non commutative group. We prove that our protocol meets the desired security attributes under the assumption that Conjugacy Search Problem and Decomposition Problem are hard in non commutative groups.
Analysis and improvement of pairing free certificate-less two-party authentic...ijsptm
The predominant grid authentication mechanisms use public key infrastructure (PKI). Nonetheless,
certificate-less public key cryptography (CL-PKC) has several advantages that seem to well align with the
demands of grid computing. Security and efficiency are the main objectives of grid authentication
protocols. Unfortunately, certificate-less authenticated key agreement protocols rely on the bilinear
pairing, that is extremely computational expensive. In this paper, we analyze the recently secure certificateless
key agreement protocols without pairing. We then propose a novel grid pairing-free certificate-less
two-party authenticated key agreement (GPC-AKA) protocol, providing a more lightweight key
management approach for grid users. We also show, a GPC-AKA security protocol proof using formal
automated security analysis Sycther tool.
Proactive Secret Sharing using a Trivariate PolynomialIJERA Editor
Secret sharing technique is a tool in cryptography which refers to distribution of a secret data among a group of
n participants .The secret can be reconstructed by combining the individual share. To reconstruct secret,
minimum of any t threshold subgroup or more shares are combined together. By secret sharing technique we can
acquire secured and decentralized communication. The shares of the participants may be compromised because
of huge exchange of messages. Secret sharing technique can be easily implemented by using polynomials. We
propose a proactive secret sharing scheme, where shares are distributed and renewed periodically without
changing the secret. This scheme also allows us to reconstruct and recover the share if share is lost. The share
can also be verified to ensure its validity. Major contribution of the paper is implementing Proactive secret
sharing scheme using Elliptic Curve cryptography and Trivariate polynomial [1].
EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITYIJNSA Journal
In a proxy re-encryption (PRE) scheme, Alice gives a special information to a proxy that allows it to transform messages encrypted under Alice's public key into a encryption under Bob's public key such that the message is not revealed to the proxy. In [14], Jian Weng and others introduced the notion of conditional proxy re-encryption (C-PRE) with bilinear pairings. Later, a break for the same was published in [17] and a new C-PRE scheme with bilinear pairings was introduced. In C-PRE, the proxy also needs to have the right condition key to transform the ciphertext (associated with a condition set by Alice) under Alice's public key into ciphertext under Bob's public key, so that Bob can decrypt it. In this paper, we propose an efficient C-PRE scheme which uses substantially less number of bilinear pairings when compared to the existing one [17]. We then prove its chosen-ciphertext security under modified Computational Diffie-Hellman (mCDH) and modified Computational Bilinear Diffie-Hellman (mCBDH) assumptions in the random oracle model.
Using NP Problems to Share Keys in Secret-Key Cryptographyiosrjce
Public key cryptography has now become an important means for providing confidentiality by its use
of key distribution, in which users can do private communication with the help of encryption keys. It also
provides digital signatures which allow users to sign keys to verify their identities. But public key cryptography
has its own shortcoming regarding to high cost in keys distribution and excessive computation in encoding and
decoding it.
Whereas private key can omit all above problems but only if we can find a way to share private key
confidentially.
This research presents an innovation, which can be our future approach, using technology so-called NP
problems, of sending or sharing keys to the receiver without any need of the third party. This will provide an
open idea where sender and receiver can share any key for any number of times for encrypting data
confidentially that also helpful in overcoming problem of brute force attack
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...CSCJournals
Cryptography has several important aspects in supporting the security of the data, which
guarantees confidentiality, integrity and the guarantee of validity (authenticity) data. One of the
public-key cryptography is the RSA cryptography. The greater the size of the modulus n, it will be
increasingly difficult to factor the value of n. But the flaws in the RSA algorithm is the time
required in the decryption process is very long. Theorem used in this research is the Chinese
Remainder Theorem (CRT). The goal is to find out how much time it takes RSA-CRT on the size
of modulus n 1024 bits and 4096 bits to perform encryption and decryption process and its
implementation in Java programming. This implementation is intended as a means of proof of
tests performed and generate a cryptographic system with the name "RSA and RSA-CRT Text
Security". The results of the testing algorithm is RSA-CRT 1024 bits has a speed of
approximately 3 times faster in performing the decryption. In testing the algorithm RSA-CRT 4096
bits, the conclusion that the decryption process is also effective undertaken more rapidly.
However, the flaws in the key generation process and the RSA 4096 bits RSA-CRT is that the
time needed is longer to generate the keys.
Identity-Based Blind Signature Scheme with Message Recovery IJECEIAES
Blind signature allows a user to obtain a signature on a message without revealing anything about the message to the signer. Blind signatures play an important role in many real world applications such as e-voting, e-cash system where anonymity is of great concern. Due to the rapid growth in popularity of both wireless communications and mobile devices, the design of secure schemes with low-bandwidth capability is an important research issue. In this paper, we present a new blind signature scheme with message recovery in the ID-based setting using bilinear pairings over elliptic curves. The proposed scheme is unforgeable with the assumption that the Computational Diffie-Hellman problem is hard. We compare our scheme with the related schemes in terms of computational and communicational point of view.
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...IJNSA Journal
The existing authenticated session key establishment protocols are either vulnerable to dictionary attack on identity privacy of a client or the methods adopted to resist this attack are found to be computationally inefficient. This paper proposes a new authenticated key establishment protocol which uses elliptic curve based DDH problem. The protocol provides identity privacy of the client in addition to the other security properties needed for a session key establishment protocol. In comparison with the existing protocols, the proposed protocol offers equivalent security with less parameters resulting in lower computational load, communication bandwidth cost, power consumption and memory requirement.
Design and implementation of network security using genetic algorithmeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Modern-day computer security relies heavily on cryptography as a means to protect the data that we have
become increasingly reliant on. The main research in computer security domain is how to enhance the
speed of RSA algorithm. The computing capability of Graphic Processing Unit as a co-processor of the
CPU can leverage massive-parallelism. This paper presents a novel algorithm for calculating modulo
value that can process large power of numbers which otherwise are not supported by built-in data types.
First the traditional algorithm is studied. Secondly, the parallelized RSA algorithm is designed using
CUDA framework. Thirdly, the designed algorithm is realized for small prime numbers and large prime
number . As a result the main fundamental problem of RSA algorithm such as speed and use of poor or
small prime numbers that has led to significant security holes, despite the RSA algorithm's mathematical
soundness can be alleviated by this algorithm.
Survey of Hybrid Encryption Algorithm for Mobile Communicationijsrd.com
To enhance the security of data transmission in Mobile communication, a hybrid encryption algorithm based on DES and RSA is proposed. The currently used encryption algorithm employed to protect the confidentiality of data during transport between two or more devices is a 128-bit symmetric block cipher. In the proposed hybrid encryption algorithm, DES algorithm is used for data transmission because of its higher efficiency in block encryption, encryption speed of DES algorithm is faster than RSA algorithm for long plaintext, and RSA algorithm distribute key safely and easily also RSA algorithm is used for the encryption of the key of the DES because of its management advantages in key cipher. Under the dual protection with the DES algorithm and the RSA algorithm, the data transmission in mobile communication system will be more secure. Meanwhile, it is clear that the procedure of the entire encryption is still simple and efficient. Digital abstract algorithm MD5 is adopted in this mechanism. Through comparing the digital signature which is transmitted by dispatcher and digital signature result of plaintext which is got by receiver through MD5 algorithm, data security can be guaranteed. This mechanism realizes the confidentiality, completeness, authentication and non- repudiation.
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodIDES Editor
This paper presents an algorithm which is hybrib of
Transposition and Substitution method.The main advantage
of this approach is ,it doesn’t use any key from outside because
key is present within the original message.Due to this the
main problem of exchanging keys securely is solved.Both Transposition
and Substitution method have their own limitations.So
we use both these method so that the resultant cipher is more
secure and strong.
Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
Different types of Authentications described in different scenarios. Basically a survey paper on Different kinds of authentications in different scenarios.
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERijcsit
The secret sharing schemes are the important tools in cryptography that are used as building blocks in
many secured protocols. It is a method used for distributing a secret among the participants in a manner
that only the threshold number of participants together can recover the secret and the remaining set of
participants cannot get any information about the secret. Secret sharing schemes are absolute for storing
highly sensitive and important information. In a secret sharing scheme, a secret is divided into several
shares. These shares are then distributed to the participants’ one each and thus only the threshold (t)
number of participants can recover the secret. In this paper we have used Mignotte’s Sequence based
Secret Sharing for distribution of shares to the participants. A (k, m) Mignotte's sequence is a sequence of
pair wise co-prime positive integers. We have proposed a new method for reconstruction of secret even
with t-1 shares using the SMT solver.
Secure and efficient data transmission for cluster based wireless sensor netw...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Reference
“Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks” H. Lu; J. Li; M. Guizani
IEEE Transactions on Parallel and Distributed Systems
Secure and efficient data transmission for cluster based wireless sensor networkRaja Shekhar
Wireless sensor network plays an vital role in research. clustering is introduced to enhance the performance of the WSNs. Cluster is nothing but a group of sensor nodes. Each cluster is having an one cluster head. Clusters are formed periodically, randomly and dynamically. Cluster concept introduced in wireless sensor network to increase the life cycle of sensor nodes,reduce / decrease the computational overhead and less power consumption.
IEEE base paper 2014 march go through completely for more information.
Identity-Based Blind Signature Scheme with Message Recovery IJECEIAES
Blind signature allows a user to obtain a signature on a message without revealing anything about the message to the signer. Blind signatures play an important role in many real world applications such as e-voting, e-cash system where anonymity is of great concern. Due to the rapid growth in popularity of both wireless communications and mobile devices, the design of secure schemes with low-bandwidth capability is an important research issue. In this paper, we present a new blind signature scheme with message recovery in the ID-based setting using bilinear pairings over elliptic curves. The proposed scheme is unforgeable with the assumption that the Computational Diffie-Hellman problem is hard. We compare our scheme with the related schemes in terms of computational and communicational point of view.
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...IJNSA Journal
The existing authenticated session key establishment protocols are either vulnerable to dictionary attack on identity privacy of a client or the methods adopted to resist this attack are found to be computationally inefficient. This paper proposes a new authenticated key establishment protocol which uses elliptic curve based DDH problem. The protocol provides identity privacy of the client in addition to the other security properties needed for a session key establishment protocol. In comparison with the existing protocols, the proposed protocol offers equivalent security with less parameters resulting in lower computational load, communication bandwidth cost, power consumption and memory requirement.
Design and implementation of network security using genetic algorithmeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Modern-day computer security relies heavily on cryptography as a means to protect the data that we have
become increasingly reliant on. The main research in computer security domain is how to enhance the
speed of RSA algorithm. The computing capability of Graphic Processing Unit as a co-processor of the
CPU can leverage massive-parallelism. This paper presents a novel algorithm for calculating modulo
value that can process large power of numbers which otherwise are not supported by built-in data types.
First the traditional algorithm is studied. Secondly, the parallelized RSA algorithm is designed using
CUDA framework. Thirdly, the designed algorithm is realized for small prime numbers and large prime
number . As a result the main fundamental problem of RSA algorithm such as speed and use of poor or
small prime numbers that has led to significant security holes, despite the RSA algorithm's mathematical
soundness can be alleviated by this algorithm.
Survey of Hybrid Encryption Algorithm for Mobile Communicationijsrd.com
To enhance the security of data transmission in Mobile communication, a hybrid encryption algorithm based on DES and RSA is proposed. The currently used encryption algorithm employed to protect the confidentiality of data during transport between two or more devices is a 128-bit symmetric block cipher. In the proposed hybrid encryption algorithm, DES algorithm is used for data transmission because of its higher efficiency in block encryption, encryption speed of DES algorithm is faster than RSA algorithm for long plaintext, and RSA algorithm distribute key safely and easily also RSA algorithm is used for the encryption of the key of the DES because of its management advantages in key cipher. Under the dual protection with the DES algorithm and the RSA algorithm, the data transmission in mobile communication system will be more secure. Meanwhile, it is clear that the procedure of the entire encryption is still simple and efficient. Digital abstract algorithm MD5 is adopted in this mechanism. Through comparing the digital signature which is transmitted by dispatcher and digital signature result of plaintext which is got by receiver through MD5 algorithm, data security can be guaranteed. This mechanism realizes the confidentiality, completeness, authentication and non- repudiation.
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodIDES Editor
This paper presents an algorithm which is hybrib of
Transposition and Substitution method.The main advantage
of this approach is ,it doesn’t use any key from outside because
key is present within the original message.Due to this the
main problem of exchanging keys securely is solved.Both Transposition
and Substitution method have their own limitations.So
we use both these method so that the resultant cipher is more
secure and strong.
Introduction to Public key Cryptosystems with block diagrams
Reference : Cryptography and Network Security Principles and Practice , Sixth Edition , William Stalling
Different types of Authentications described in different scenarios. Basically a survey paper on Different kinds of authentications in different scenarios.
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERijcsit
The secret sharing schemes are the important tools in cryptography that are used as building blocks in
many secured protocols. It is a method used for distributing a secret among the participants in a manner
that only the threshold number of participants together can recover the secret and the remaining set of
participants cannot get any information about the secret. Secret sharing schemes are absolute for storing
highly sensitive and important information. In a secret sharing scheme, a secret is divided into several
shares. These shares are then distributed to the participants’ one each and thus only the threshold (t)
number of participants can recover the secret. In this paper we have used Mignotte’s Sequence based
Secret Sharing for distribution of shares to the participants. A (k, m) Mignotte's sequence is a sequence of
pair wise co-prime positive integers. We have proposed a new method for reconstruction of secret even
with t-1 shares using the SMT solver.
Secure and efficient data transmission for cluster based wireless sensor netw...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Reference
“Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks” H. Lu; J. Li; M. Guizani
IEEE Transactions on Parallel and Distributed Systems
Secure and efficient data transmission for cluster based wireless sensor networkRaja Shekhar
Wireless sensor network plays an vital role in research. clustering is introduced to enhance the performance of the WSNs. Cluster is nothing but a group of sensor nodes. Each cluster is having an one cluster head. Clusters are formed periodically, randomly and dynamically. Cluster concept introduced in wireless sensor network to increase the life cycle of sensor nodes,reduce / decrease the computational overhead and less power consumption.
IEEE base paper 2014 march go through completely for more information.
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...Nexgen Technology
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...nexgentechnology
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
anonymous and efficient authentication scheme for privacy-preserving distribu...SUBHAJIT GHOSH
This report provides an overview of the anonymous and efficient authentication scheme for privacy-preserving distributed learning. This work has helped to alleviate some of the drawbacks of privacy-preserving in distributed learning or has innovated new technologies for various applications. I attempted to identify the paper's problem(s) while also comprehending the methodology (that is, the working model and algorithms).
AN EFFICIENT AND SECURE DIGITAL MULTI-SIGNATURE PROTOCOL BASED ON ECCijcisjournal
Digital Signatures play a crucial role today as it ensures authentication, integrity and non-repudiation of a digital message. Many researches are ongoing based on elliptic curve cryptography due to its significant high performance. In this paper we propose an efficient and secure digital multi-signature protocol based on elliptic curve cryptography. The proposed protocol is efficient with reduced time complexity as compared to Chen et al.[14], Sahu and Sharma [18] and Chande and Thakur’s [20] digital multi-signature schemes. Also the proposed protocol overcomes the insider attack as specified by Liu et al. [19] in the Chen et.al’s digital multi-signature scheme.
A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWOR...cscpconf
Providing security in group communication is more essential in this new network environment. Authentication and Confidentiality are the major concerns in secure group
communication. Our proposed approach uses an authenticated group key transfer protocol that relies on trusted key generation center (KGC). KGC computes group pair for each
individual and transport the pair of values to all group members in a secured manner. Password based authentication mechanism is used to avoid the illegal member access in a
group Also, the proposed approach facilitates efficient key computation technique such that only authorized group members will be able to computer and retrieve the secret key and unauthorized members cannot retrieve the key. The proposed algorithm is more efficient and relies on NP class. In addition, the distribution of key is also safe and secure. Moreover, the pair generated for the computation of key is also very strong since the cryptographic techniques are used which provides efficient computation.
A secure key computation protocol for secure group communication with passwor...csandit
Providing security in group communication is more essential in this new network
environment. Authentication and Confidentiality are the major concerns in secure group
communication. Our proposed approach uses an authenticated group key transfer protocol
that relies on trusted key generation center (KGC). KGC computes group pair for each
individual and transport the pair of values to all group members in a secured manner.
Password based authentication mechanism is used to avoid the illegal member access in a
group Also, the proposed approach facilitates efficient key computation technique such that
only authorized group members will be able to computer and retrieve the secret key and
unauthorized members cannot retrieve the key. The proposed algorithm is more efficient and
relies on NP class. In addition, the distribution of key is also safe and secure. Moreover, the
pair generated for the computation of key is also very strong since the cryptographic
techniques are used which provides efficient computation.
Elliptic Curve Based Server Authentication System for Multi-Server Infrastruc...CrimsonPublishersRDMS
Elliptic Curve Based Server Authentication System for Multi-Server Infrastructure by Himanshu Monga* in Crimson Publishers: Peer Reviewed Material Science Journals
LDPC Encoding and Hamming Encoding using MATLAB.
An LDPC code is a linear block code characterised by a very sparse parity-check matrix. This means that the parity check matrix has a very low concentration of 1’s in it, hence the name is “low-density parity-check” code. The sparseness of LDPC codes is what as it can lead to excellent performance in terms of bit error rates.
Certificate less key management scheme inIJNSA Journal
In mobile adhoc networks (MANETs) an efficient and secure key management scheme is extremely crucial. Key management schemes for MANETs are mainly based on identity-based public key cryptography (ID-PKC) or certificate-based public key cryptography, both of which has their inherit problem. The ID-PKC has the key escrow problem and certificate based cryptography have a high computational costs of certificates deployment. In this paper, we present a distributed key management scheme, in which a combination of certificate less public key cryptography (CL-PKC) and threshold cryptography is employed. The scheme proposed in this paper not only achieves several enhanced security attributes for key management in MANET but also eliminates the need for certificate-based public key distribution and the key escrow problem efficiently.
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHYIJNSA Journal
In mobile adhoc networks (MANETs) an efficient and secure key management scheme is extremely crucial. Key management schemes for MANETs are mainly based on identity-based public key cryptography (IDPKC) or certificate-based public key cryptography, both of which has their inherit problem. The ID-PKC has the key escrow problem and certificate based cryptography have a high computational costs of certificates deployment. In this paper, we present a distributed key management scheme, in which a combination of certificate less public key cryptography (CL-PKC) and threshold cryptography is employed. The scheme proposed in this paper not only achieves several enhanced security attributes for key management in MANET but also eliminates the need for certificate-based public key distribution and the key escrow problem efficiently.
V design and implementation of network security using genetic algorithmeSAT Journals
Abstract Over the last few years, Secured transmission of data has been a major issue in data communication. This project mainly concerns about the security of confidential information and data transmission using public key cryptography with Genetic Algorithm in order to provide confidentiality, authentication, integrity and non-repudiation of the messages. First, an algorithm is developed and implemented to generate a key pair (Private and public Key).A plain text is encrypted using the Public Key of receiver to produce an intermediate cipher. The intermediate cipher is again encrypted using genetic algorithm to produce final cipher. The final cipher first decrypted to produce the intermediate cipher which in turn decrypted to get the plain text using the Private key of the receiver or vice versa. Index Terms: Network Security, Genetic Algorithm
Ciphertext policy Attribute based Encryption with anonymous access policy ijp2p
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt
the encrypted message. The policy can be formed with the help of attributes. In CP-ABE, access policy is
sent along with the ciphertext. We propose a method in which the access policy need not be sent along
with the ciphertext, by which we are able to preserve the privacy of the encryptor. The proposed
construction is provably secure under Decision Bilinear Diffe-Hellman assumption.
Ciphertext policy Attribute based Encryption with anonymous access policyijp2p
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt
the encrypted message. The policy can be formed with the help of attributes. In CP-ABE, access policy is
sent along with the ciphertext. We propose a method in which the access policy need not be sent along
with the ciphertext, by which we are able to preserve the privacy of the encryptor. The proposed
construction is provably secure under Decision Bilinear Diffe-Hellman assumption.
Ciphertext policy Attribute based Encryption with anonymous access policy ijp2p
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt
the encrypted message. The policy can be formed with the help of attributes. In CP-ABE, access policy is
sent along with the ciphertext. We propose a method in which the access policy need not be sent along
with the ciphertext, by which we are able to preserve the privacy of the encryptor. The proposed
construction is provably secure under Decision Bilinear Diffe-Hellman assumption.
Ciphertext Policy Attribute Based Encryption with Anonymous Access Policy ijp2p
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt
the encrypted message. The policy can be formed with the help of attributes. In CP-ABE, access policy is
sent along with the ciphertext. We propose a method in which the access policy need not be sent along
with the ciphertext, by which we are able to preserve the privacy of the encryptor. The proposed
construction is provably secure under Decision Bilinear Diffe-Hellman assumption.
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
The cyber attacks have become most prevalent in the past few years. During this time, attackers have discovered new vulnerabilities to carry out malicious activities on the internet. Both the clients and the servers have been victimized by the attackers. Clickjacking is one of the attacks that have been adopted by the attackers to deceive the innocuous internet users to initiate some action. Clickjacking attack exploits one of the vulnerabilities existing in the web applications. This attack uses a technique that allows cross domain attacks with the help of userinitiated clicks and performs unintended actions. This paper traces out the vulnerabilities that make a website vulnerable to clickjacking attack and proposes a solution for the same.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Monitoring Java Application Security with JDK Tools and JFR Events
An Efficient and Secure ID Based Group Signature Scheme from Bilinear Pairings
1. Int. J. Advanced Networking and Applications
Volume: 06 Issue: 06 Pages: 2559-2562 (2015) ISSN: 0975-0290
2559
An Efficient and Secure ID Based Group
Signature Scheme from Bilinear Pairings
Pankaj Sarde
Dept. of Mathematics, Rungta College of Engineering and Technology, Raipur, CG, India
Email: pnsarde@gmail.com
Amitabh Banerjee
Dept. of Mathematics, Govt. D. B. Girls PG College, Raipur, CG, India
Email: amitabh_61@yahoo.com
--------------------------------------------------------------------ABSTRACT-------------------------------------------------------------
We propose an efficient and secure identity based group signature scheme from bilinear pairings. Group
signature allows group member to sign arbitrary number of messages on behalf of the group without revealing
their identity. Under certain circumstances the group manger holding a tracing key can reveal the identities of the
signer from the signature. Our scheme is based on the Computation Diffie-Hellman Problem (CDHP) assumption
and bilinear pairings. In the scheme, the size of the group public key and length of the signature are independent
on the numbers of the group members
Keywords: Group Signature, Bilinear Pairings, ID based Cryptography
----------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: January 30, 2015 Date of Acceptance: May 01, 2015
----------------------------------------------------------------------------------------------------------------------------------------------
1. Introduction:
Group signature introduced by Chaum and E. Van
Heyst [1], allows any member of a group to sign
messages on behalf of the group. Anyone can verify the
signature with a group public key while no one can
know the identity of signer except the group manager.
Further it is computationally hard to decide whether two
different signatures were issued by the same member.
Plenty of the group signature schemes [2, 3, 4, 5, 6]
have been presented after the Chaum and Van Heyst’s
initial works. However, most of them are much
inefficient for large groups because the group public
key and length of the signature depend on the size of the
group. In 1997 J. Camenisch and M. Stadler [7]
proposed the first efficient group signature scheme for
which the group public key and group signature are
both of constant size. Atenese et al. [8] proposed a
practical and provably coalition-resistant secure group
signature scheme. Recently, M. Bellare, D.Micciancio
and B. Warinschi [9] provides theoretical foundations
for the group signature primitive. The concept of ID
based cryptography was introduced by Shamir [10] to
simplify key managements procedure of certified based
public key infrastructure. An identity based crypto-
system [10, 11] is a system that allows a publicly
known identifier (email address, IP address, name) to be
used as the public key component of a public/private
key pair in a crypto-system. An ID-based group
signature scheme is firstly proposed by S. Park, S. Kim
and D. Won [12]. However, it is inefficient the size of
the group public key and length of a group signature
depend on the size of the group. Another ID based
group signature scheme is proposed by Tseng and Jan
[13], unfortunately it is universally forgeable. X Chen et
al [14] proposed a new ID based group signature
scheme from bilinear pairings. The scheme presented an
approach to solve the key escrow problem. Several ID
based signature schemes have been proposed in the last
years [15, 16, 17]. Some of the schemes use Elliptic
curve algorithms and are therefore particularly efficient.
The rest of the paper is organized as follows.
Basic definition and properties is presented in section 2.
Some preliminary works in section 3. Our new ID based
group signature scheme from bilinear pairings is given
in section 4. The security and efficiency analysis of our
scheme are given in section 5. Finally concluding
remarks will be made in section 6.
2. Group Signatures
In this section we introduce the definition and
security properties of group signatures [14].
Definition 2.1 A group signature scheme is a
digital signature scheme consisted of the following four
procedures:
Setup: On input a security k, the probabilistic
algorithm outputs the initial group public key
Y and the secret key s of the group manager.
Join: A protocol between the group manager
and a user that result in the user becoming a
new group member. The user's output is a
membership certificate and a membership
secret.
Sign: A probabilistic algorithm that an input a
group public key, a membership certificate, a
membership secret and a message m. Output is
the group signature of m.
Verify: An algorithm takes as input the group
public key Y, the signature, the message m to
output 1 or 0.
Open: The deterministic algorithm takes as
input the messages m, the signature, the group
manager's secret key s to return “ Identity or
failure”
A secure group signature must satisfy the following
properties:
2. Int. J. Advanced Networking and Applications
Volume: 06 Issue: 06 Pages: 2559-2562 (2015) ISSN: 0975-0290
2560
Correctness: Signature produced by a group
member using Sign must be accepted by
Verify.
Unforgeability: Only the group members can
sign messages on behalf of the group.
Anonymity: Given a valid signature, it is
computationally hard to identify the signer for
any-one except the group manager.
Unlinkability: Deciding whether two different
valid signatures were computed by the same
group member is computationally hard for any-
one except the group manager.
Traceability: The group manager is always
able to open a valid signature & identify the
signer.
Exculpability: Neither the group manager nor
a group member can sign messages on behalf
of other group members. Also, the group
manager or colludes with some group
members can misattribute a valid group
signature to frame a certain members.
Coalition-resistance: A colluding subset of
group members (even if comprised of the
whole group ) cannot produce a valid signature
that the group manager cannot open.
Efficiency: The efficiency of group signature
is based on the parameters: the size of the
group public key, the length of the group
signature and the efficiency of the algorithms
and protocols of the group signatures
3. Preliminary Works:
In this section, we will briefly describe the basic
definition and properties of bilinear pairing and Gap
Diffie-Hellman Group. We also presented ID-based
public key setting from pairing.
3.1 Bilinear Pairings:
Let G1 be a cyclic additive group generated by P, whose
order is prime q, and G2 be a cyclic multiplicative group
of the same order q. Let a, b be elements of qZ
. We
assume that the DLP in both G1 and G2 are hard. A
bilinear pairing is a map 211: GGGe with the
following properties:
I. Bilinear: ab
QPbQaPe ,,
II. Non-degenerate: There exist 1, GQP such
that 1, QPe
III. Computable: There is an efficient algorithm
to compute e(P, Q) for all 1, GQP
3.2 Gap Diffie-Hellman Group
Let G1 be a cyclic additive group generated by P whose
order is prime q, assume that the inversion and
multiplication in G1 can be computed efficiently. We
first introduce the following problem in G1
Discrete Logarithm Problem(DLP):
Given two elements P and Q, to find an integer
qZn
such that Q=nP
whenever such an integer exist.
Computation Diffie-Hellman Prob-
lem(CDHP): Given P, aP, bP for
qZcba
,, to compute abP.
Decision Diffie Hellman Problem (DDHP):
Given P, aP, bP, cP for qZcba
,, to
decide whether qabc mod .
We call G1 a Gap Diffie-Hellman Group if DDHP can
be solved in polynomial time but there is no polynomial
time algorithm to solve CDHP or DLP with non-
negligible probability such group can be found in
supersingular elliptic curve or hyperelliptic curve over
finite field, and the bilinear pairing can be derived from
the Weil or Tate pairings.
4. Proposed ID based group signature scheme
from bilinear pairings
We propose an ID-based group signature scheme from
bilinear pairing. We only need to consider that Key
generation centre (KGC) is the group manager. We
can’t adopt the usual ID-based system. Since key
escrow is fatal drawback for traditional ID-based
system. So it assumed that that KGC must be trusted
unconditionally. Otherwise, the system will be
collapsed. If KGC act as the group manager of a group,
he can forge the signature of any users. Therefore, the
most important thing to design an ID-based group
signature scheme is to solve the problem of key-escrow.
Proposed scheme consists of six
procedures: Set-up, Extract, Join, Sign, Verify, and
Open. In our scheme, KGC is assumed no longer to be
a trusted party.
Let G1 be a Gap DH cyclic additive group
generated by P, whose order is prime order q and G2 be
a cyclic multiplicative group of same order q. A
bilinear pairing is a map 211: GGGe . Define
Cryptographic hash function 111 1,0: GGH
,
qZH
1,0:2 and qZGH
13 :
Setup: KGC chooses a generator P of G1 and
picks a random number qZs
and set
sPPpub . Thus system Parameters are
32121 ,,,,,,,, HHHPPqeGG pub and keep
s as the master secret key, which is known
only him-self.
Extract: A user Ui submit his (or her) identity
information IDi and rP to KGC, where
qZr
long-term private key. Then KGC
computes the user’s public key
rPTIDHQ iIDi ,||1 . Here T is life Span
of r and sends IDiIDi sQS to the user via a
secure channel. Thus user’s private key pair is
(r, SIDi). The user should update his key pair
after period of T. We call SIDi, rP pseudo
3. Int. J. Advanced Networking and Applications
Volume: 06 Issue: 06 Pages: 2559-2562 (2015) ISSN: 0975-0290
2561
secret, since KGC is no longer trustful , it may
expose them to other members.
Join: Suppose that a user Ui wants to join the
group. For this, he and KGC perform Join
protocol as follows:
1. The user Ui chooses a random
number qi Zx
, then sends
PxIDrPrx iii ,,, to KGC
2. If KGC is convinced that the user
know rPTIDsHS iIDi ,||1
and
rPxePPrxe ii ,, , KGC
sends secretly
PrxIDsHs iii ,1 to the user Ui
Thus user’s member certificates are Prxs ii ,
and his private signing key is irx . KGC adds
iii IDrPPxPrx ,,, to the member list.
Sign: To sign a message m, the user Ui
randomly chooses number qZk
,, and
uses her signing key and corresponding member
certificate and then computes the following
values:
)5....(..........)]()([
)4...(..........)(),(
)3(..........)(),(
)2.........(..........
)1........(..........
324
213
312
1
i
iii
iii
IDii
sRHmHS
PmHPrxIDHrxS
PRHPrxIDHrxS
QrxS
kPR
Thus ID-based group signature on the message m is
PrxSSSSR i,,,,, 4321
Verify: To verify a group signature
PrxSSSSR i,,,,, 4321 on the message m.
Verifier accept the signature if following equation
holds
)7......(..........
,,
)6...(..........
,
),(),(
1
3
24
3
2
PrxQePSe
PSe
PSePrxSe
iIDi
RH
pub
mH
pubi
If it is true then PrxSSSSR i,,,,, 4321 is
valid ID based group signature on the message m
Open: In case of dispute, the KGC can easily
identify the user. The signer can’t deny the
signature after KGC present a proof. KGC
check the following equation:
)8...(..........
,,,
,,
,,),(
),,||(,
1432
1
1
1
32
SSeSSeSSe
PrxSePSe
PPrxIDHePse
PrPTIDHePSe
RH
IDi
mH
IDi
iIDipub
pubiii
pubiIDi
5. Analysis of Our Scheme
In this section, we prove that security of our group
signature scheme on the assumption that G1 is gap DH
group.
Theorem 5.1. If there is an adversary A1 (without
colluding with KGC) can forge a member certificate
with time t and a non-negligible probability , then we
can solve CDHP in G1 at most with time t and a non-
negligible probability
Proof: The adversary A1 forge a valid pseudo-secret
key and member certificate with non-negligible
probability , through the following process. First
adversary A1 queries the random oracle H1(:) at most t
times. Then he outputs a tuple
iIDiii sSPrxrPID ,,,, in which (ID, rP, rxP) were
not queried. If the tuple is valid, it must satisfy the
open function.
pubiii
pubiIDi
PPrxIDHePs
PrPTIDHePSe
,,,
,,||,
1
1
Let rPIDH ||1 OR aPrxPIDH ||1 ,
bPPpub . Then adversary can solve CDHP in G1 for
SID=abP with negligible probability .
Theorem 5.2. Proposed ID-based group signature from
bilinear pairings is secure under the assumption of
CDHP is hard in the oracle.
Proof: A secure group signature scheme should satisfy
several security properties, we examine the security of
our scheme according to the requirements.
Correctness: To prove (6)
),(
),(
),
,,(
),,(
),,(
,,
4
32
3121
3231
3221
32
32
PrxSe
PrxsRHsmHe
P
RHPrxIDHrxmHPrxIDHrxe
PPRHmHRHPrxIDHrxe
PPRHmHmHPrxIDHrxe
PSePSe
i
iii
pub
iiiiii
pubiii
pubiii
RH
pub
mH
pub
and
),(,, PrxQePQrxePse iIDiIDiii
To prove (8)
4. Int. J. Advanced Networking and Applications
Volume: 06 Issue: 06 Pages: 2559-2562 (2015) ISSN: 0975-0290
2562
),(
),(
),
,,(
),,(
),,(
,,
14
32
3121
3231
3221
32
32
SSe
QrxsRHsmHe
Srx
RHPrxIDHmHPrxIDHe
SPRHmHRHPrxIDHrxe
SPRHmHmHPrxIDHrxe
SSeSSe
IDiiii
IDii
iiii
IDiiii
IDiiii
RH
IDi
mH
IDi
Unforgeability: In our scheme, only group
members can sign messages on behalf of the group.
Since membership certificate for user Ui is (Si, rxiP)
which are made by KGC.
Anonymity: In our scheme, only KGC is able to
open the signature and to recover who signed it.
Since xi is randomly chosen and rxiP reveals no
identity information of user to anyone except KGC.
Unlinkability: Given rxiP and rxjP. It is
computationally hard to decide that they are
correspondence to same rP without knowing the xiP
and xjP
Exculpability: In our scheme, a group member
can't sign on behalf of other members because it
does not know the other members private keys.
The KGC knows each user's private key si but
he doesn’t know user's private key rxi. Since
one period T corresponds only one unique rP
Coalition-resistance:Membership certificate of
each group member is unique which is generated
by KGC. Thus colluding subset of group members
cannot produce a valid signature that the group
manager cannot open
6. Conclusion
In this paper we describe an efficient and secure ID
based group signature scheme from bilinear pairing. In
this signature scheme the group public key and
parameters are constant don't depend on the group
members. Thus generated group signature can handle
large groups and the security of such a group sig-nature
scheme is strong as compare to other ID based group
signature scheme.
References
[1] D. Chaum and E. Van Heyst, Group Signatures,
Advances in Cryptology-Eurocrypt-1991, LNCS
547, PP. 257 - 265, Springer-Verlag, 1991
[2] G. Ateniese, G. Tsudik, Some open issues and new
direction in group signatures, Financial
Cryptography 1999, LNCS 1648, PP. 196-211,
Springer-Verlag, 1999
[3] J. Camenisch, Efficient and generlized group
signatures, Advances in Cryptology-Eurocrypt
1997, LNCS 1233, PP. 465 - 479, Springer-Verlag,
1997
[4] L. Chen and T. Pedersen, New group signatures
schemes, Advances in cryptology-Eurocrypt 1994 ,
LNCS 950, PP. 171-181, Springer-Verlag, 1994
[5] L. Chen, T. Pedersen, On the efficiency of group
signatures providing information-theoretic
anonymity. In Advances in Cryptology-
CRYPTO'91, Springer-Verlag, 1991, pp.196-198.
[6] H. Petersen, How to convert any digital signature
scheme into group signature scheme. In security
protocols workshop 1997, PP. 177 -190, Springer-
Verlag, 1997.
[7] J. Camenisch and M. Stadler, Efficient group
signature schemes for large groups. Advances in
Cryptology-Eurocrypt'97, LNCS 1294, Springer-
Verlag, 1997, PP. 410 - 424.
[8] G. Ateniese, J. Camenisch, M. Joye, G. T-sudik. A
practical and provably secure coalition-resistant
group signature scheme. Advances in Cryptology-
Crypto'2000, LNCS 1880, Springer-Verlag, 2000,
PP. 255 – 270
[9] M. Bellare, D. Micciancio, B. Warinschi,
Foundation of group signatures: formal definition,
simplified requirements and a construction based
on general assumption. Advances in Cryptology-
Eurocrypt’2003, LNCS 2656, Springer-Verlag,
2003, 614-629
[10]A.Shamir. Identity based cryptosystems and
signature schemes, Proceedings of CRYPTO'84,
LNCS 196, Springer-Verlag, 1985, PP. 47 -53.
[11]D. Boneh and M. Frauklin, Identity based
Encryption from Weil pairing, Advances in
cryptology-CRYPTO'2001, Springer-Verlag,
LNCS, Vol. 2139, PP. 213 - 229, 2001.
[12]S. Park, S. Kim and D. Won, ID-based group
signature, Electronics Letters, 33(19), 1997, PP.
1613 – 1617.
[13]Y. Tseng and J. Jan, A novel ID based group
signature, International computer symposium,
workshop on cryptology and information security,
1998, PP. 159 -164.
[14]X. Chen, F. Zhang and K. Kim, A new ID based
group signature scheme from bilinear pairing
http://eprint.iacr.org/2003/116, 2003
[15]K. Paterson, Id-based signatures from pairings on
elliptic curves, Tech. Rep., IACR Cryptology e
print Archieve: Report 2002/004,
http://eprint.iacr/2002/004/, 2002.
[16]C. Popescu, Group signature schemes based on the
difficulty of computations of approximate eth roots,
Proceedings of protocols for multimedia systems
(PROMS 2000), Polond, PP.325- 331, 2000.
[17] R.Sakai,K.Ohgishi, and M. kasahara,
Cryptosystems based on pairing, Proceedings of
symposium on cryptography and information
security, Japan, Okinawa, PP. 26 - 28, 2000.