Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,

Slides:



Advertisements
Similar presentations
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
Advertisements

1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
A scalable key pre-distribution mechanism for large-scale wireless sensor networks Author: A. N. Shen, S. Guo, H. Y. Chien and M. Y. Guo Source: Concurrency.
1 Optimal Resource Placement in Structured Peer-to-Peer Networks Authors: W. Rao, L. Chen, A.W.-C. Fu, G. Wang Source: IEEE Transactions on Parallel and.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Cryptanalysis and Improvement of an Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem Reporter : Tzer-Long Chen Information Sciences.
Yu-Li Lin and Chien-Lung Hsu Department of Information Management, Chang-Gung University Information Science(SCI) Reporter: Tzer-Long Chen.
A Secure Identification and Key Agreement Protocol with User Anonymity (SIKA) Authors: Kumar Mangipudi and Rajendra Katti Source: Computers & Security,
A novel DRM framework for peer-to- per music content delivery Authors: Jung-Shian Li, Che-Jen Hsieh, Cheng-Fu Hung Source: 2010, Journal of Systems and.
Data Hiding in a Kind of PDF Texts for Secret Communication Authors : S.P. Zhong, X.Q. Cheng, and T.R. Chen Source : International Journal of Network Security,
MSN lab1 A novel deniable authentication protocol using generalized ElGamal signature scheme Source: Information Sciences, vol. 177, pp , 2007.
Fair Blind Signature Based Authentication for Super Peer P2P Network Authors: Xiaoliang Wang and Xingming Sun Source: 2009, Information Technology Journal,
A novel key management scheme for dynamic access control in a user hierarchy Authors: Tzer-Shyong Chen ( 陳澤雄 ) and Jen-Yan Huang Source: Applied Mathematics.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
A Secure Authentication Scheme with Anonymity for Wireless Communications IEEE COMMUNICATIONS LETTERS, VOL. 12, NO. 10, OCTOBER 2008 Chia-Chun Wu, Wei-Bin.
Source: Computers & Security, Vol. 24, No. 5, pp , August 2005
Non-PKI Methods for Public Key Distribution
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Source: The Journal of Systems and Software, Vol. 73, 2004, pp.507–514
Reporter :Chien-Wen Huang
Proxy Blind Signature Scheme
Key Substitution Attacks on Some Provably Secure Signature Schemes
A Simple Provably Secure AKE from the LWE Problem
A lightweight authentication scheme based on self-updating strategy for space information network Source: International Journal Of Satellite Communications.
Cryptanalysis on Mu–Varadharajan's e-voting schemes
Source: Computers & Security, vol.23, pp , 2004 Author: Heba K. Aslan
A secure and traceable E-DRM system based on mobile device
Der-Chyuan Lou and Jiang-Lung Liu,
An efficient threshold RSA digital signature scheme
Efficient password authenticated key agreement using smart cards
A robust and anonymous patient monitoring system using wireless medical sensor networks Source: Future Generation Computer Systems, Available online 8.
Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data Source : IEEE INFOCOM IEEE International Conference on Computer Communications,
Anonymous Wireless Authentication on a Portable Cellular Mobile System
Security of a Remote Users Authentication Scheme Using Smart Cards
Efficient Time-Bound Hierarchical Key Assignment Scheme
Methods for Preventing Unauthorized Software Distribution
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Wei-Chi KU, Hao-Chuan TSAI, Maw-Jinn TSAUR
Privacy Preserving Ranked Multi-Keyword
Picode: A New Picture-Embedding 2D Barcode
Centrality Bias Measure for High Density QR Code Module Recognition
A Secure and Efficient Cloud Resource Allocation Scheme with Trust
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Source : IEEE Access, Vol. 6, pp , Jan. 2018
Source: Ad Hoc Networks, Vol. 71, pp , 2018
2018/7/28 GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid Authors: Jianbin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
A Novel Latin Square-based Secret Sharing for M2M Communications
An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
PDE-General form -The second group
A lightweight biometrics based remote user authentication scheme for IoT services Source: Journal of Information Security and Applications Volume 34, Part.
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Controllable and Trustworthy Blockchain-based Cloud Data Management
Research Paper Overview.
Authors: Yuh-Min TSENG, Tsu-Yang WU, Jui-DiWU
Digital Watermarking for Image Authentication with Localization
Secret Image Sharing Based on Encrypted Pixels
A Robust Digital Watermarking Of Satellite Image at Third Level DWT Decomposition Source:International Conference on Computational Intelligence and Multimedia.
Source: Journal of Systems and Software, Vol. 140, pp , June 2018
Source:Journal of Systems and Software, vol. 140, pp , June 2018
Improvement of Chien et al
Detectability Improved Tamper Detection Scheme for Absolute Moment Block Truncation Coding Compressed Images Source: Symmetry, Vol. 10, No. 8, pp. 318.
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
A Fast No Search Fractal Image Coding Method
Privacy Protection for E-Health Systems by
Source: Multidim Syst Sign Process, vol. 29, no. 4, pp , 2018
A Quadratic-Residue-based Fragile Watermarking Scheme
Adopting secret sharing for reversible data hiding in encrypted images
Presentation transcript:

Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security, Vol22, No 5, pp. 453-456,2003 Author: Chien-Lung Hsu ,Tzong-Sun Wu Speaker: Yi-Fang Cheng Date: 2004 11/8

Outline Introduction Wu-Chang scheme Shen-Chen scheme Cryptanalyses Improvement Conclusion

Introduction C1 C2 C3 C5 C4 C6 (u11,u12,u13,u14) (u21,u22)

Wu-Chang scheme (1/2) Key generation stage : C1 C2 C3 C5 C4 C6

Wu-Chang scheme (2/2) Key derivation stage : C1 C2 C3 C5 C4 C6 u31 u52

Shen-Chen scheme (1/2) Key generation stage : C1 C2 C3 C5 C4 C6

Shen-Chen scheme (2/2) Key derivation stage : C1 C2 C3 C5 C4 C6

Cryptanalysis of Wu-Chang scheme C3 can get the private key of C4 C1 C2 C3 C5 C4 C6

Cryptanalysis of Shen-Chen scheme C3 can get the private key of C4 C1 C2 C3 C5 C4 C6

Improvement of Wu-Chang scheme Modify the polynomial function by using a one-way hash function

Improvement of Shen-Chen scheme Modify the polynomial function by using a one-way hash function

Conclusion To eliminate the security leaks by using a one way hash function