-
Article
Multi-exponentiation algorithm based on binary GCD computation and its application to side-channel countermeasure
A series of algorithms for evaluation of multi-exponentiation are proposed based on the binary greatest common divisor algorithm. The proposed algorithms are inversion free and have the capability to evaluate ...
-
Article
Universally composable one-time signature and broadcast authentication
Broadcast authentication is a vital security primitive for the management of a copious number of parties. In the universally composable framework, this paper investigates broadcast authentication using one-tim...
-
Article
Universally composable secure TNC model and EAP-TNC protocol in IF-T
This paper analyzes trusted network connect (TNC) protocols within the universally composable (UC) framework. We propose the first TNC model in the UC framework by first designing the TNC ideal functionality ℱTNC
-
Chapter and Conference Paper
Fuzzy Identity-Based Identification Scheme
We present a new type of Identity-Based Identification (IBI), namely Fuzzy Identity-Based Identification (FIBI). FIBI is an extension of traditional IBI where the identity (ID) is viewed as a set of values. In FI...
-
Article
Open AccessConstructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing
Group key exchange (GKE) is one of the basic building blocks in securing group communication. A number of solutions to GKE problem have been proposed, but most of them are not scalable and require a number of ...
-
Article
A new approach for UC security concurrent deniable authentication
Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such authentication ever took place. When we consider a...
-
Chapter and Conference Paper
A Security Enhancement of the E0 Cipher in Bluetooth System
Summation generator was analyzed by Dawson’s divide-and-conquer- attack[1] and showed us the weakness by Golic’s correlation attack[3] and Meier’s Fast correlation attack[4]. In this paper, We propose a Circul...
-
Chapter and Conference Paper
A New Formal Proof Model for RFID Location Privacy
The privacy and security problems in RFID systems have been extensively studied. However, less research has been done on formal analysis of RFID security. The existing adversarial models proposed in the litera...
-
Article
Universally composable anonymous Hash certification model
Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity au...
-
Chapter and Conference Paper
Low-Cost and Strong-Security RFID Authentication Protocol
This paper proposes a low-cost and strong-security RFID protocol to reduce the computational load on both the back-end database and the tags in an RFID system. When desynchronization occurs as a result of a co...
-
Chapter and Conference Paper
Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP)
Choi et al. recently proposed an efficient RFID authentication protocol for a ubiquitous computing environment, OHLCAP (One-Way Hash based Low-Cost Authentication Protocol). However, this paper reveals that the p...
-
Chapter and Conference Paper
A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit
Power analysis attack, which was introduced by Kocher et al. in 1999, was known as the most threatening physical attack against low power device such as smart-card. The essential reason that allows an attacker...
-
Article
Provable efficient certificateless group key exchange protocol
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we pr...
-
Chapter and Conference Paper
Ternary Tree Based Group Key Management in Dynamic Peer Networks
For group-oriented applications, designing secure and efficient group key management schemes is a major problem. We present a group key management scheme for dynamic peer networks, which supports join, leave, ...
-
Chapter and Conference Paper
Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC
Recently, it has been shown that some cryptographic devices, such as smart card, RFID and USB token, are vulnerable to the power attacks if they have no defence against them. With the introduction of new types...
-
Chapter and Conference Paper
LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System
Despite various solutions to the security problems in an RFID system, most are unable to fully support all the security requirements. Plus, when designing a viable RFID system, account should also be taken of ...
-
Chapter and Conference Paper
HGLAP – Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System
This paper presents a low-cost and secure authentication protocol to reduce the computational load on both the back-end database and the tags in a distributed RFID system. The proposed protocol is based on a h...
-
Chapter and Conference Paper
Investigations of Power Analysis Attacks and Countermeasures for ARIA
In this paper we investigate implementations of ARIA on an 8-bit smartcard. Our investigation focuses on the resistance against different types of differential power analysis (DPA) attacks. We show that an unp...
-
Chapter and Conference Paper
Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan
With the Canetti-Krawczyk (CK) model, we analyze the authentication module WAIs in the Chinese WLAN national security standard WAPI and its implementation plan respectively. The security weaknesses of WAI in t...
-
Chapter and Conference Paper
Cryptanalysis of Tso et al.’s ID-Based Tripartite Authenticated Key Agreement Protocol
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secret key, which is used to prese...