IET Inf. Secur.最新文献

筛选
英文 中文
Comment on 'Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards' 关于“使用智能卡的分布式系统的高效和安全的动态基于id的远程用户认证方案”的评论
IET Inf. Secur. Pub Date : 2017-07-01 DOI: 10.1049/iet-ifs.2016.0218
Goutham Reddy Alavalapati, Eunjun Yoon, K. Yoo
{"title":"Comment on 'Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards'","authors":"Goutham Reddy Alavalapati, Eunjun Yoon, K. Yoo","doi":"10.1049/iet-ifs.2016.0218","DOIUrl":"https://doi.org/10.1049/iet-ifs.2016.0218","url":null,"abstract":"This comment paper refers to an article published by Leu and Hsieh in IET Information Security in the year 2014. Leu and Hsieh proposed a remote user authentication protocol for distributed systems using smartcard. Their protocol affords user anonymity and no verification tables at either end, which can decrease the storage space along with the computations. Their protocol can resist security attacks and is efficient compared with few relevant protocols in terms of computational cost. However, this comment paper brings questions about the correctness of the design of Leu and Hsieh's protocol.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"71 1","pages":"220-221"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85892285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust profiled attacks: should the adversary trust the dataset? 健壮的分析攻击:攻击者应该信任数据集吗?
IET Inf. Secur. Pub Date : 2017-07-01 DOI: 10.1049/iet-ifs.2015.0574
Liran Lerman, Zdenek Martinasek, O. Markowitch
{"title":"Robust profiled attacks: should the adversary trust the dataset?","authors":"Liran Lerman, Zdenek Martinasek, O. Markowitch","doi":"10.1049/iet-ifs.2015.0574","DOIUrl":"https://doi.org/10.1049/iet-ifs.2015.0574","url":null,"abstract":"Side-channel attacks provide tools to analyse the degree of resilience of a cryptographic device against adversaries measuring leakages (e.g. power traces) on the target device executing cryptographic algorithms. In 2002, Chari et al. introduced template attacks (TA) as the strongest parametric profiled attacks in an information theoretic sense. Few years later, Schindler et al. proposed stochastic attacks (representing other parametric profiled attacks) as improved attacks (with respect to TA) when the adversary has information on the data-dependent part of the leakage. Less than ten years later, the machine learning field provided non-parametric profiled attacks especially useful in high dimensionality contexts. In this study, the authors provide new contexts in which profiled attacks based on machine learning outperform conventional parametric profiled attacks: when the set of leakages contains errors or distortions. More precisely, the authors found that (i) profiled attacks based on machine learning remain effective in a wide range of scenarios, and (ii) TA are more sensitive to distortions and errors in the profiling and attacking sets.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"37 1","pages":"188-194"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83106491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal non-linearity 具有高维矢量输出和严格几乎最优非线性的弹性s盒的构造
IET Inf. Secur. Pub Date : 2017-07-01 DOI: 10.1049/iet-ifs.2016.0168
Weiguo Zhang, Luyang Li, E. Pasalic
{"title":"Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal non-linearity","authors":"Weiguo Zhang, Luyang Li, E. Pasalic","doi":"10.1049/iet-ifs.2016.0168","DOIUrl":"https://doi.org/10.1049/iet-ifs.2016.0168","url":null,"abstract":"Resilient substitution boxes (S-boxes) with high non-linearity are important cryptographic primitives in the design of certain encryption algorithms. There are several trade-offs between the most important cryptographic parameters and their simultaneous optimisation is regarded as a difficult task. In this study, the authors provide a construction technique to obtain resilient S-boxes with so-called strictly almost optimal non-linearity for a larger number of output bits m than previously known. This is the first time that the non-linearity bound 2 n−1 − 2 n/2 of resilient (n,m) S-boxes, where n and m denote the number of the input and output bits, respectively, has been exceeded for m>⌊n/4⌋. Thus, resilient S-boxes with extremely high non-linearity and a larger output space compared with other design methods have been obtained.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"18 1","pages":"199-203"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86530034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient methods to generate cryptographically significant binary diffusion layers 生成密码有效二进制扩散层的有效方法
IET Inf. Secur. Pub Date : 2017-07-01 DOI: 10.1049/iet-ifs.2016.0085
S. Akleylek, V. Rijmen, M. T. Sakalli, Emir Öztürk
{"title":"Efficient methods to generate cryptographically significant binary diffusion layers","authors":"S. Akleylek, V. Rijmen, M. T. Sakalli, Emir Öztürk","doi":"10.1049/iet-ifs.2016.0085","DOIUrl":"https://doi.org/10.1049/iet-ifs.2016.0085","url":null,"abstract":"In this study, the authors propose new methods using a divide-and-conquer strategy to generate n × n binary matrices (for composite n) with a high/maximum branch number and the same Hamming weight in each row and column. They introduce new types of binary matrices: namely, ( BHwC ) t, m and ( BCwC ) q, m types, which are a combination of Hadamard and circulant matrices, and the recursive use of circulant matrices, respectively. With the help of these hybrid structures, the search space to generate a binary matrix with a high/maximum branch number is drastically reduced. By using the proposed methods, they focus on generating 12 × 12, 16 × 16 and 32 × 32 binary matrices with a maximum or maximum achievable branch number and the lowest implementation costs (to the best of their knowledge) to be used in block ciphers. Then, they discuss the implementation properties of binary matrices generated and present experimental results for binary matrices in these sizes. Finally, they apply the proposed methods to larger sizes, i.e. 48 × 48, 64 × 64 and 80 × 80 binary matrices having some applications in secure multi-party computation and fully homomorphic encryption.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"55 1","pages":"177-187"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85642815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cheating prevention visual cryptography scheme using Latin square 利用拉丁方防止作弊的可视化密码方案
IET Inf. Secur. Pub Date : 2017-06-26 DOI: 10.1049/iet-ifs.2016.0126
Y. Ren, Feng Liu, Teng Guo, Rongquan Feng, D. Lin
{"title":"Cheating prevention visual cryptography scheme using Latin square","authors":"Y. Ren, Feng Liu, Teng Guo, Rongquan Feng, D. Lin","doi":"10.1049/iet-ifs.2016.0126","DOIUrl":"https://doi.org/10.1049/iet-ifs.2016.0126","url":null,"abstract":"In the past decade, the researchers paid more attention to the cheating problem in visual cryptography (VC) so that many cheating prevention visual cryptography schemes (CPVCS) have been proposed. In this paper, the authors propose a novel method, which first makes use of Latin square to prevent cheating in VC. Latin squares are utilised to guide the choosing of authentication regions in different rows and columns of each divided block of the shares, which ensures that the choosing of authentication regions is both random and uniform. Without pixel expansion, the new method provides random regions authentication in each divided block of all shares. What is important is that the proposed method is applicable to both (\u0000 k\u0000, n\u0000)-deterministic visual cryptography scheme ((\u0000 k\u0000, n\u0000)-DVCS) and (\u0000 k\u0000, n\u0000)-probabilistic visual cryptography scheme ((\u0000 k\u0000, n\u0000)-PVCS). Experimental results and properties analysis are given to show the effectiveness of the proposed method.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"16 1","pages":"211-219"},"PeriodicalIF":0.0,"publicationDate":"2017-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90765551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Linear complexity of Legendre-polynomial quotients legende -多项式商的线性复杂度
IET Inf. Secur. Pub Date : 2017-05-03 DOI: 10.1049/iet-ifs.2017.0307
Zhixiong Chen
{"title":"Linear complexity of Legendre-polynomial quotients","authors":"Zhixiong Chen","doi":"10.1049/iet-ifs.2017.0307","DOIUrl":"https://doi.org/10.1049/iet-ifs.2017.0307","url":null,"abstract":"We continue to investigate binary sequence $(f_u)$ over ${0,1}$ defined by $(-1)^{f_u}=left(frac{(u^w-u^{wp})/p}{p}right)$ for integers $uge 0$, where $left(frac{cdot}{p}right)$ is the Legendre symbol and we restrict $left(frac{0}{p}right)=1$. In an earlier work, the linear complexity of $(f_u)$ was determined for $w=p-1$ under the assumption of $2^{p-1}notequiv 1 pmod {p^2}$. In this work, we give possible values on the linear complexity of $(f_u)$ for all $1le w<p-1$ under the same conditions. We also state that the case of larger $w(geq p)$ can be reduced to that of $0leq wleq p-1$.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"20 1","pages":"414-418"},"PeriodicalIF":0.0,"publicationDate":"2017-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75646257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Directed proxy signature with fast revocation proven secure in the standard model 具有快速撤销的定向代理签名在标准模型中被证明是安全的
IET Inf. Secur. Pub Date : 2017-05-01 DOI: 10.1049/iet-ifs.2015.0285
Liaojun Pang, Yufei Hu, Xia Zhou, Yumin Wang, Huixian Li
{"title":"Directed proxy signature with fast revocation proven secure in the standard model","authors":"Liaojun Pang, Yufei Hu, Xia Zhou, Yumin Wang, Huixian Li","doi":"10.1049/iet-ifs.2015.0285","DOIUrl":"https://doi.org/10.1049/iet-ifs.2015.0285","url":null,"abstract":"As a kind of special proxy signature, directed proxy signature can be used to sign messages, such that only the designated verifier can easily verify the validity of the signature while others cannot. At the same time, if necessary, the proxy signer or designated verifier can prove the validity of the signature to any third party. However, the revocation of delegated rights has never been considered in the existing directed proxy signature schemes. In fact, in these directed proxy signature schemes, even if the period of delegation has expired, the proxy signer still can generate the valid proxy signature, and the original signer can do nothing to prevent it. Therefore, the authors give a solution to the delegation revocation problem and propose a directed proxy signature scheme with fast revocation in this study. The security and the invisibility of the authors’ scheme are proven based on the gap Diffie–Hellman assumption and under the decisional Diffie–Hellman problem in the standard model, respectively.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"47 1","pages":"168-176"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84959539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Balanced anonymity and traceability for outsourcing small-scale data linear aggregation in the smart grid 智能电网中外包小规模数据线性聚合的平衡匿名和可追溯性
IET Inf. Secur. Pub Date : 2017-05-01 DOI: 10.1049/iet-ifs.2016.0150
Huaqun Wang, D. He, Shibing Zhang
{"title":"Balanced anonymity and traceability for outsourcing small-scale data linear aggregation in the smart grid","authors":"Huaqun Wang, D. He, Shibing Zhang","doi":"10.1049/iet-ifs.2016.0150","DOIUrl":"https://doi.org/10.1049/iet-ifs.2016.0150","url":null,"abstract":"Along with the development of information technology, the traditional electrical grid is moving to smart grid technology. By using the smart grid, the users and utility providers can more efficiently manage and generate power. Along with the advantages, the smart grid is also faced with new security concerns. In the smart grid, the user's citizen identity information should be preserved and the offensive user should be traced. For some low-capacity devices, it is indispensable to perform complicated computation by using outsourcing computation. The authors provide the outsourcing computation through public cloud. Anonymity and traceability are two important security properties in the smart grid. They are the unity of opposites. On the basis of the security requirements, they propose the balanced anonymity and traceability for outsourcing small-scale data linear aggregation (BAT-LA) in the smart grid. The formal definition, system model and security model are presented. Then, a concrete BAT-LA protocol is designed by using the elliptic curve cryptography and proxy re-encryption. Through security analysis and performance analysis, the designed BAT-LA protocol is provably secure and efficient.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"11 1","pages":"131-138"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88239545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Detecting multiple H.264/AVC compressions with the same quantisation parameters 用相同的量化参数检测多个H.264/AVC压缩
IET Inf. Secur. Pub Date : 2017-05-01 DOI: 10.1049/iet-ifs.2015.0361
Zhenzhen Zhang, J. Hou, Yu Zhang, Jingyu Ye, Y. Shi
{"title":"Detecting multiple H.264/AVC compressions with the same quantisation parameters","authors":"Zhenzhen Zhang, J. Hou, Yu Zhang, Jingyu Ye, Y. Shi","doi":"10.1049/iet-ifs.2015.0361","DOIUrl":"https://doi.org/10.1049/iet-ifs.2015.0361","url":null,"abstract":"Multiple-compression detection is of particular importance in video forensics, as it reveals possible manipulations to the content. However, methods for detecting multiple compressions with same quantisation parameters (QPs) are rarely reported. To deal with this issue, a novel method is presented in this study to detect multiple H.264/advanced video coding compressions with the same QPs. First, a new set, named ratio difference set (RDS), is proposed, which is calculated by identifying the quantised DCT coefficients whose values will be changed after re-compression. Then, a discriminative and fixed statistical feature set extracted from RDS of each video is obtained to serve as input for classification. With the aid of support vector machines, the extracted feature set is used to classify the videos that have undergone H.264 compressions twice or more from those compressed just once. Experimental results show that high classification accuracy and robustness against copy-move attack and frame-deletion attack can be achieved with the authors’ proposed method.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"49 1","pages":"152-158"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86453136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Conditional differential attacks on Grain-128a stream cipher Grain-128a流密码的条件差分攻击
IET Inf. Secur. Pub Date : 2017-04-27 DOI: 10.1049/iet-ifs.2016.0060
Zhen Ma, Tian Tian, Wen-feng Qi
{"title":"Conditional differential attacks on Grain-128a stream cipher","authors":"Zhen Ma, Tian Tian, Wen-feng Qi","doi":"10.1049/iet-ifs.2016.0060","DOIUrl":"https://doi.org/10.1049/iet-ifs.2016.0060","url":null,"abstract":"The well-known stream cipher Grain-128a is the new version of Grain-128. While Grain-128 is vulnerable against several introduced attacks, Grain-128a is claimed to be secure against all known attacks and observations on Grain-128. So far the only published single-key attack on Grain-128a is the conditional differential cryptanalysis proposed by Michael Lehmann et al. at CANS 2012. In their analysis, a distinguishing attack on 189-round Grain-128a in a weak-key setting was proposed. In this study, the authors present two new conditional differential attacks on Grain-128a, i.e. attack A and attack B. In attack A, the authors successfully retrieve 18 secret key expressions for 169-round Grain-128a. To the best of our knowledge, attack A is the first attack to retrieve secret key expressions for reduced Grain-128a. In attack B, the authors extend the distinguishing attack against Grain-128a up to 195 rounds in a weak-key setting. Thus far, attack B is the best known attack for reduced Grain-128a as far as the number of rounds attacked is concerned. Hopefully, the authors’ reflections on the design of Grain-128a provide insights on such compact stream ciphers.","PeriodicalId":13305,"journal":{"name":"IET Inf. Secur.","volume":"1 1","pages":"139-145"},"PeriodicalIF":0.0,"publicationDate":"2017-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83220703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信