Source: Ad Hoc Networks, Vol. 71, pp , 2018

Slides:



Advertisements
Similar presentations
BY JYH-HAW YEH COMPUTER SCIENCE DEPT. BOISE STATE UNIVERSITY Proxy Credential Forgery Attack to Two Proxy Signcryption Schemes.
Advertisements

11 Efficient and Secure Certificateless Authentication and Key Agreement Protocol for Hybrid P2P Network Authors: Z. B. Xu and Z. W. Li Source: The 2nd.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Certificateless encryption and its infrastructures Dr. Alexander W. Dent Information Security Group Royal Holloway, University of London.
Weakness of Shim’s New ID- base Tripartite Multiple-key Agreement Protocol Authors: J.S. Chou, C.H.Lin and C.H. Chiu ePrint/2005/457 Presented by J. Liu.
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
Certificateless Authenticated Two-Party Key Agreement Protocols
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes Author: Stanislaw Jarecki and Xiaomin Liu University of California, Irvine From:
Certificateless Threshold Ring Signature Source: Information Sciences 179(2009) Author: Shuang Chang, Duncan S. Wong, Yi Mu, Zhenfeng Zhang Presenter:
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
1 Hidden Exponent RSA and Efficient Key Distribution author: He Ge Cryptology ePrint Archive 2005/325 PDFPDF 報告人:陳昱升.
Security Arguments for Digital Signatures and Blind Signatures Journal of Cryptology, (2000) 13: Authors: D. Pointcheval and J. Stern Presented.
1 Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing From : ePrint (August 2005) Author : Junghyun Nam, Seungjoo.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
Lecture 8 Digital Signatures. This lecture considers techniques designed to provide the digital counterpart to a handwritten signature. A digital signature.
An ID-Based Mutual Authentication and Key Exchange Protocol for Low- Power Mobile Devices Authors: Tsu-Yang Wu and Yuh-Min Tseng Source: The Computer Journal.
A Secure Identification and Key Agreement Protocol with User Anonymity (SIKA) Authors: Kumar Mangipudi and Rajendra Katti Source: Computers & Security,
Linkability of Some Blind Signature Schemes Swee-Huay Heng 1, Wun-She Yap 1 Khoongming Khoo 2 1 Multimedia University, 2 DSO National Laboratories.
Cryptanalysis of Some Proxy Signature Schemes without Certificates Wun-She Yap, Swee-Huay Heng Bok-Min Goi Multimedia University.
多媒體網路安全實驗室 Anonymous ID Signature Scheme with Provable Identity Date: Reporter :Chien-Wen Huang 出處: 2008 Second International Conference on Future.
An Improved Efficient Secret Handshakes Scheme with Unlinkability Author: Jie Gu and Zhi Xue Source: IEEE Comm. Letters 15 (2) (2011) Presenter: Yu-Chi.
Key Replacement Attack on a Certificateless Signature Scheme Zhenfeng Zhang and Dengguo Feng Presenter: Yu-Chi Chen.
A new provably secure certificateless short signature scheme Authors: K.Y. Choi, J.H. Park, D.H. Lee Source: Comput. Math. Appl. (IF:1.472) Vol. 61, 2011,
A New Provably Secure Certificateless Signature Scheme Date: Reporter:Chien-Wen Huang 出處 :2008 IEEE International Conference on Communications.
Certificateless signature revisited X. Huang, Yi Mu, W. Susilo, D.S. Wong, W. Wu ACISP’07 Presenter: Yu-Chi Chen.
MSN lab1 A novel deniable authentication protocol using generalized ElGamal signature scheme Source: Information Sciences, vol. 177, pp , 2007.
A Novel Cryptography for Ad Hoc Network Security ► Pi Jian-yong; Liu Xin-song; Wu Ai; Liu Dan; ► 2006 International Conference on Communications, Circuits.
Certificateless Threshold Ring Signature Source: Information Sciences 179(2009) Author: Shuang Chang, Duncan S. Wong, Yi Mu, Zhenfeng Zhang Presenter:
What is in a name? Identity-based cryptography. How public-key crypto works When you use public key cryptography, you can publish a value (public key)
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
Smart Card Based Authenticated Key Agreement Schemes
Presented by Edith Ngai MPhil Term 3 Presentation
Non-PKI Methods for Public Key Distribution
A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks Zhen Yu & Yong Guan Department of Electrical and Computer Engineering.
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Reporter :Chien-Wen Huang
Proxy Blind Signature Scheme
Ming Zhang, Vishal Khanapure, Shigang Chen, Xuelian Xiao
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
Key Substitution Attacks on Some Provably Secure Signature Schemes
A Simple Provably Secure AKE from the LWE Problem
A lightweight authentication scheme based on self-updating strategy for space information network Source: International Journal Of Satellite Communications.
A Concrete Certificateless Signature Scheme without Pairings
A secure and traceable E-DRM system based on mobile device
Source : Future Generation Computer Systems, Vol. 68, pp , 2017
Certificateless signature revisited
Security of a Remote Users Authentication Scheme Using Smart Cards
Identity-based deniable authentication protocol
A flexible date-attachment scheme on e-cash
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Wei-Chi KU, Hao-Chuan TSAI, Maw-Jinn TSAUR
Image camouflage by reversible image transformation
Authors : Parwinder Kaur Dhillon and Sheetal Kalra
Source : IEEE Access, Vol. 6, pp , Jan. 2018
A Novel Latin Square-based Secret Sharing for M2M Communications
An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
A New Provably Secure Certificateless Signature Scheme
A lightweight biometrics based remote user authentication scheme for IoT services Source: Journal of Information Security and Applications Volume 34, Part.
Controllable and Trustworthy Blockchain-based Cloud Data Management
CSC 774 Advanced Network Security
Published in 2016 International Computer Symposium (ICS) Authors
A Note on Secure Key Issuing in ID-based Cryptography
Source: Sensors, Volume 19, Issue 9 (May )
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
Privacy Protection for E-Health Systems by
A Quadratic-Residue-based Fragile Watermarking Scheme
A lightweight authentication scheme with privacy protection for smart grid communications Source: Future Generation Computer Systems Volume 100, November.
How to Use Charm Crypto Lib
Presentation transcript:

An Efficient Provably-secure Certificateless Signature Scheme for Internet-of-Things Deployment Source: Ad Hoc Networks, Vol. 71, pp. 78-87, 2018 Authors: Xiaoying Jia, Debiao He, Qin Liu and Kim- Kwang Raymond Choo Speaker:Hsiao-Ling Wu Date:2018/01/18

Outline Introduction Proposed scheme Comparisons Conclusions CL-PKC, Security model Proposed scheme Comparisons Conclusions

Introduction(1/1) Certificateless public key cryptography (CL-PKC) S.S. Al-Riyami and K.G. Paterson, “Certificateless public key cryptography,” Advances in Cryptology - ASIACRYPT 2003, Springer, 2003, pp. 452–473. D. He, J. Chen, and R. Zhang, “An efficient and provably secure certificateless signature scheme without bilinear pairings,” Int. J. Commun. Syst. 25 (11) (2011) 1432–1442. K.H. Yeh, C. Su, K.-K.R. Choo, and W. Chiu, “A novel certificateless signature scheme for smart objects in the internet-of-things,” Sensors 17 (5) (2017) 1001 .

Introduction(1/1) Security model Type I - Key Replacement Attack. A third party tries to impersonate a user after compromising the user secret key and/or replacing the user public key with some value chosen by the third party. However, it does not know the user partial key. Type II - Malicious KGC Attack. The KGC, who knows the partial key of a user, is malicious and tries to impersonate the user. However, the KGC does not know the user secret key or being able to replace the user public key.

Proposed scheme(1/6) This scheme consists of seven algorithms: Setup Partial-Private-Key-Extraction Set-Secret-Value Set-Private-Key Set-Public-Key Sign Verify

Proposed scheme(2/6) Setup Key generator centre (KGC)

Proposed scheme(3/6) Partial-Private-Key-Extraction Key generator centre (KGC) Signer

Proposed scheme(4/6) Set-Secret-Value Set-Private-Key Set-Public-Key Signer Set-Private-Key Set-Public-Key

Proposed scheme(5/6) Sign Signer

Proposed scheme(6/6) Verify Verifier

Comparisons [31] K.H. Yeh , C. Su , K.-K.R. Choo , W. Chiu , A novel certificateless signature scheme for smart objects in the internet-of-things, Sensors 17 (5) (2017) 1001 .

Conclusions A certificateless signature scheme without bilinear pairings Random oracle

Appendix(1/1) Certificateless public key cryptography (CL-PKC) Key generator center (KGC) Verifier Signer