2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)最新文献

筛选
英文 中文
Blind Multipurpose Image Watermarking Based on Secret Sharing 基于秘密共享的盲多用途图像水印
Sorour Sheidani, Ziba Eslami
{"title":"Blind Multipurpose Image Watermarking Based on Secret Sharing","authors":"Sorour Sheidani, Ziba Eslami","doi":"10.1109/ISCISC48546.2019.8985160","DOIUrl":"https://doi.org/10.1109/ISCISC48546.2019.8985160","url":null,"abstract":"In this paper, in order to accomplish two goals of multimedia authentication and copyright protection, we present a multipurpose watermarking method based on a commonly used cryptographic primitive called verifiable secret sharing scheme. Utilizing this primitive, our scheme achieves blindness meaning that it needs neither the original host image nor the embedded watermark. Our scheme also does not need two distinct watermarks to authenticate the images and at the same time protect their copyright. Experimental results show that the features of the shares, obtained by the used primitive from watermark, enables our method to reconstruct extracted tampered watermarks after various attacks such as JPEG compression, cropping, salt and pepper noise, median filtering, some combined attacks, etc. Comparisons are provided with other multipurpose watermarking methods which primarily aim at protecting copyright of media and authenticating it simultaneously. We also show the superiority of our proposed method to three watermarking methods attaining the goals of copyright protection and authentication.","PeriodicalId":128407,"journal":{"name":"2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122586644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISCISC 2019 Authors Index ISCISC 2019作者索引
{"title":"ISCISC 2019 Authors Index","authors":"","doi":"10.1109/iscisc48546.2019.8985141","DOIUrl":"https://doi.org/10.1109/iscisc48546.2019.8985141","url":null,"abstract":"","PeriodicalId":128407,"journal":{"name":"2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122085453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISCISC 2019 Program Committee ISCISC 2019项目委员会
{"title":"ISCISC 2019 Program Committee","authors":"","doi":"10.1109/iscisc48546.2019.8985144","DOIUrl":"https://doi.org/10.1109/iscisc48546.2019.8985144","url":null,"abstract":"","PeriodicalId":128407,"journal":{"name":"2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126008943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Ultra-Lightweight RFID Mutual Authentication Protocol 一种超轻量RFID互认证协议
Abbas Rahnama, Mohammad Beheshti-Atashgah, T. Eghlidos, M. Aref
{"title":"An Ultra-Lightweight RFID Mutual Authentication Protocol","authors":"Abbas Rahnama, Mohammad Beheshti-Atashgah, T. Eghlidos, M. Aref","doi":"10.1109/ISCISC48546.2019.8985164","DOIUrl":"https://doi.org/10.1109/ISCISC48546.2019.8985164","url":null,"abstract":"In some applications of the Internet of Things (IoT), for privacy preserving and authentication of entities, it is necessary to use ultra-lightweight cryptographic algorithms. In this paper, we propose a new ultra-lightweight authentication protocol between RFID components, in which only simple operations are used. In this protocol, the server has access to the data gathered by the tag in the same authentication phase through the reader interface, instead of sharing a secret key. The proposed protocol is secure against several attacks, such as replay attacks, denial of service, offline guessing attacks, modification attacks, full disclosure attacks and impersonation attacks, in addition to its practicality when compared to the previously proposed RFID authentication protocols. It also provides anonymity of tags against readers and the other tags involved in the protocol.","PeriodicalId":128407,"journal":{"name":"2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129404412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improvement of Digest Based Authentication Scheme for Biometric Verification 基于摘要的生物特征认证方案改进
F. S. Babamir, M. Kirci
{"title":"Improvement of Digest Based Authentication Scheme for Biometric Verification","authors":"F. S. Babamir, M. Kirci","doi":"10.1109/ISCISC48546.2019.8985143","DOIUrl":"https://doi.org/10.1109/ISCISC48546.2019.8985143","url":null,"abstract":"Normally, authenticating a system in an untrusted environment is performed through mechanisms such as identification card, password checking and etc. However, by the development of technology, cracking such systems through forging password or stealing identification card may be done leading to the lack of security and hence privacy. This is why biometric based authentication systems are appropriate offer to provide security of clients. Through such systems, clients are verified and permitted to login to the system according to their physical or behavioral traits. Biometric systems offer several advantages over traditional authentication methods. Moreover, these systems, protects the privacy of clients, confidentiality and integrity of critical information for emerging technology such as smartphones and other appliances. In this paper, we improved our previous biometric authentication system and through some practical scenarios, we considered different attacks from client, server, and network sides to intrude into the privacy. We mathematically proved that our scheme is indistinguishable and prevents the attacker to threat legitimate individuals' information and privacy. Finally, we showed our computation and memory efficiency compared with related studies.","PeriodicalId":128407,"journal":{"name":"2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127323835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New RF-PUF Based Authentication of Internet of Things Using Random Forest Classification 一种基于RF-PUF的随机森林分类物联网认证方法
A. Ashtari, A. Shabani, B. Alizadeh
{"title":"A New RF-PUF Based Authentication of Internet of Things Using Random Forest Classification","authors":"A. Ashtari, A. Shabani, B. Alizadeh","doi":"10.1109/ISCISC48546.2019.8985161","DOIUrl":"https://doi.org/10.1109/ISCISC48546.2019.8985161","url":null,"abstract":"This paper presents a novel RF-PUF based authentication framework which exploits the intrinsic non-idealities in physical characteristic of a device/medium to generate a unique identity for wireless nodes. It also takes the advantage of Random Forest classification to securely identify the sender nodes based on their unique features extracting from already-existing modules in the receiver side. In contrast to the neural network-based schemes, our proposed approach incurs lower design complexity and overheads, while it no longer needs a large amount of preparatory and preprocessing works related to the learning process and adjusting the network parameters. Thus, the overall runtime required to preparing and testing of network is drastically lessened. The experimental results show that the proposed scheme can reach to 100% accuracy in the identification of 225 nodes when a forest network with 100 trees and depth of 20 is developed, posing a negligible overhead on the receiver side. This high accuracy can be nearly achieved even in the presence of channel variations as our approach has less sensitivity to environmental conditions.","PeriodicalId":128407,"journal":{"name":"2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131884937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Lightweight Involutive Components for Symmetric Cryptography 对称密码的轻量级对合分量
S. M. Dehnavi, M. M. Shamsabad, A. M. Rishakani
{"title":"Lightweight Involutive Components for Symmetric Cryptography","authors":"S. M. Dehnavi, M. M. Shamsabad, A. M. Rishakani","doi":"10.1109/ISCISC48546.2019.8985148","DOIUrl":"https://doi.org/10.1109/ISCISC48546.2019.8985148","url":null,"abstract":"Lightweight components are used in the design of modern lightweight ciphers. In the current paper, firstly we investigate a new family of lightweight $4times 4$ almost MDS diffusion layers, mathematically, and determine when they are involutive. The proposed diffusion layers are suitable for software applications and have less fixed points, compared with the existent ones. Then, we examine the cryptographic properties of nonlinear components constructed by a 2-round Feistel scheme, theoretically, and propose some concrete examples of them, including lightweight hardware-oriented $8times 8$ S-boxes. We compare the presented S-boxes with the ones in Midori-128.","PeriodicalId":128407,"journal":{"name":"2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114069092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lightweight Anonymous Authentication Protocol For IoT Wireless Sensor Networks 面向物联网无线传感器网络的轻量级匿名认证协议
Abbas Rahnama, Mohammad Beheshti-Atashgah, T. Eghlidos, M. Aref
{"title":"A Lightweight Anonymous Authentication Protocol For IoT Wireless Sensor Networks","authors":"Abbas Rahnama, Mohammad Beheshti-Atashgah, T. Eghlidos, M. Aref","doi":"10.1109/ISCISC48546.2019.8985154","DOIUrl":"https://doi.org/10.1109/ISCISC48546.2019.8985154","url":null,"abstract":"Lightweight authentication protocols are crucial for privacy preserving in Internet of Things (IoT). Authentication protocols should be implementable for devices with constrained memory and computational power in this area, in addition to resistance against cryptographic threats. On the other hand, these protocols should not impose a heavy computational load on such devices. In this paper we proposed an authentication protocol that properly meets these features. Our protocol is suitable for wireless sensor networks (WSNs). In this protocol, authentication is fulfilled with low communication and computational loads between sensors and users through the gateway interface using a hash function and XOR operations. Besides, the user has access the required data, collected by the sensor, in the same authentication phase.","PeriodicalId":128407,"journal":{"name":"2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133107259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication 基于组的M2M通信安全轻量级切换认证协议
M. Modiri, J. Mohajeri, M. Salmasizadeh
{"title":"GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication","authors":"M. Modiri, J. Mohajeri, M. Salmasizadeh","doi":"10.1109/ISCISC48546.2019.8985145","DOIUrl":"https://doi.org/10.1109/ISCISC48546.2019.8985145","url":null,"abstract":"Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, various protocols and schemes were proposed to achieve security requirements in M2M communication and reduce computational and communication costs. In this paper, we propose the group-based secure lightweight handover authentication (GSLHA) protocol for M2M communication in LTE and future 5G networks. The proposed protocol mutually authenticates a group of MTC devices (MTCDs) and a new eNodeB (eNB) when these simultaneously enter the coverage of the eNB with considering all the cellular network requirements. The security analysis and formal verification by using the AVISPA tool show that the protocol has been able to achieve all the security goals and overcome various attacks. In addition, the comparative performance analysis of the handover authentication protocols shows that the proposed protocol has the best computational and communication overheads.","PeriodicalId":128407,"journal":{"name":"2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125508256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Anonymous Attribute-based Access Control System Supporting Access Structure Update 支持访问结构更新的基于匿名属性的访问控制系统
Mostafa Chegenizadeh, M. Ali, J. Mohajeri, M. Aref
{"title":"An Anonymous Attribute-based Access Control System Supporting Access Structure Update","authors":"Mostafa Chegenizadeh, M. Ali, J. Mohajeri, M. Aref","doi":"10.1109/ISCISC48546.2019.8985155","DOIUrl":"https://doi.org/10.1109/ISCISC48546.2019.8985155","url":null,"abstract":"It is quite common nowadays for clients to outsource their personal data to a cloud service provider. However, it causes some new challenges in the area of data confidentiality and access control. Attribute-based encryption is a promising solution for providing confidentiality and fine-grained access control in a cloud-based cryptographic system. Moreover, in some cases, to preserve the privacy of clients and data, applying hidden access structures is required. Also, a data owner should be able to update his defined access structure at any time when he is online or not. As in several real-world application scenarios like e-health systems, the anonymity of recipients, and the possibility of updating access structures are two necessary requirements. In this paper, for the first time, we propose an attribute-based access control scheme with hidden access structures enabling the cloud to update access structures on expiry dates defined by a data owner.","PeriodicalId":128407,"journal":{"name":"2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122401143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信