2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)最新文献

筛选
英文 中文
Radian: Leveraging PKI for Long-Term Validation Enabled Digital Academic Testimonials - A Case-Study 弧度:利用PKI进行长期验证的数字学术证明-案例研究
Souvik Pan, Dhiman Saha, R. Moona
{"title":"Radian: Leveraging PKI for Long-Term Validation Enabled Digital Academic Testimonials - A Case-Study","authors":"Souvik Pan, Dhiman Saha, R. Moona","doi":"10.1109/PKIA56009.2022.9952257","DOIUrl":"https://doi.org/10.1109/PKIA56009.2022.9952257","url":null,"abstract":"Portable Document Formats (PDFs) are widely used throughout the world for exchanging documents. The main reason of their popularity is that this format maintains the structure of the original document without taking into consideration the software that was used to draft the document. PDFs also provide authenticity and integrity of documents by using and verifying signatures. Since this all happens digitally the security notion of the verification has to be stronger than in analog world. Nowadays digital certificates and digital contracts have equivalent importance as that of physical certificates and contracts. Digital signatures using cryptographic algorithms provide a way to verify a PDF's authenticity and integrity. In this paper, we show how Public-Key Infrastructure (PKI) can be leveraged to seamlessly deploy a solution that can revolutionize the way academic testimonials are distributed. The solution not only uses digital signatures using PKCS11 hardware tokens to provide authenticity to documents but also used an interesting feature in PDF ISO standard that allows embedding of revocation information in the document itself for allowing Long-Term Validation (LTV). All this is combined to develop Radian, a software conceived and designed in IIT Bhilai to provide digitally signed academic testimonials. These testimonials hold an immediate advantage over physical counterparts as they are tamper proof and self-contained in terms of their verification. Finally, this work showcases an interesting combination of PKI mechanism with advances in PDF technology to present a high impact use-case that can change the way academic testimonials will be issued in the future.","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130786940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Unconfirmed Transactions in Cryptocurrency: Reasons, Statistics, and Mitigation 加密货币中未经确认的交易:原因、统计和缓解
Harshal Shridhar Kallurkar, B. R. Chandavarkar
{"title":"Unconfirmed Transactions in Cryptocurrency: Reasons, Statistics, and Mitigation","authors":"Harshal Shridhar Kallurkar, B. R. Chandavarkar","doi":"10.1109/PKIA56009.2022.9952297","DOIUrl":"https://doi.org/10.1109/PKIA56009.2022.9952297","url":null,"abstract":"Blockchain has emerged to be a pioneer fundamental technology for distributed applications. Not only it is limited to financial sector, but it also has extended in the fields of health & medicare, managing logistics of goods through effective supply chain management etc. Although there are numerous applications of blockchain, cryptocurrencies remains at the top, in terms of popularity and cryptographic security it provides in maintenance of digital assets. Miner(s) in a cryptocurrency is/are an individual/group of individuals who benefit after per-forming Proof-of-Work for validating a transaction. The top two cryptocurrencies according to market cap value are Bitcoin and Ether. Millions of transactions happen on their blockchain on a daily basis, but not all of them result in success. Some are also marked as failed/unconfirmed, even if they are less compared to the confirmed transactions. Some of the reasons for this behavior could be too many transactions present in mempool of miners or insufficient fees is provided as the incentive to the miners of the network. Though the number of transactions that go unconfirmed per day is very small compared to the ones getting confirmed, still the area of failed cryptocurrency transactions remain unexplored. This paper focuses on statistics of failed cryptocurrency transactions, some primary reasons of failure in a cryptocurrency transaction. Furthermore, it also presents existing approaches to minimize the failure of transactions.","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129179211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Random Number Generation for PKI Using Controlled Anderson PUF 基于可控Anderson PUF的PKI随机数生成
Aditi Roy, K. Jagadeesh, R. Natarajan, B. S. Begum
{"title":"Random Number Generation for PKI Using Controlled Anderson PUF","authors":"Aditi Roy, K. Jagadeesh, R. Natarajan, B. S. Begum","doi":"10.1109/PKIA56009.2022.9952259","DOIUrl":"https://doi.org/10.1109/PKIA56009.2022.9952259","url":null,"abstract":"In many cryptographic systems, a random number generator is an essential component. Because random numbers are unpredictable, they are required in these systems. This generated number is either used as the cryptographic algorithm's key or as a random nonce. Various true random number generator has already existing. Among them the most hardware resource efficient solutions are Physical unclonable Function (PUF) based solution. In this paper use of one such resource efficient solution has been proposed which is implemented on a zynq ultralscale+ MPSoC chip and on zynq 7000 series soc chip(Zedboard) with minimum resource utilization. The 64 bit PUF design uses 280 look-up-tables(LUTs) on zynq MPSsoC board and 302 LUTs on Zedboard and340 registers for both. Also the collected responses show good stability at different times and with temperature of around 20°C −30°C.","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"6 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134532131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimentation on Usage of PQC Algorithms for eSign PQC算法在设计中的应用实验
Pavan Kurariya, Ankita Bhargava, Srikanth Sailada, N. Subramanian, Jahnavi Bodhankar, Ajai Kumar
{"title":"Experimentation on Usage of PQC Algorithms for eSign","authors":"Pavan Kurariya, Ankita Bhargava, Srikanth Sailada, N. Subramanian, Jahnavi Bodhankar, Ajai Kumar","doi":"10.1109/PKIA56009.2022.9952354","DOIUrl":"https://doi.org/10.1109/PKIA56009.2022.9952354","url":null,"abstract":"In recent years, there has been ample research on quantum computing technology that uses quantum mechanics to solve complex mathematical problems that are difficult for classical computers to solve. Currently, digital communication has been secured by many of the public-key cryptosystems that could be compromised by quantum computers. The objective of post-quantum cryptography (also called quantum-resistant cryptography) in cryptographic systems is to protect information against quantum and classical computers. This paper proposes the use of post-quantum cryptographic (PQC) algorithms in digital signature applications over classical cryptographic algorithms to obtain confidentiality and integrity against quantum computers. To promote PQC in electronic signature applications (e-Sign), we developed a platform (QEsign) to illustrate and analyze the available PQC algorithms to evaluate the performance of the signing time required for a digital signature certificate (DSC) generation in the eSign system. Furthermore, QEsign also provides a provision to generate the CSR (Certificate Signing Request) by providing certificate subject information, which will be exploited to issue the DSC signed by post-quantum algorithms, and the evaluation report will be visualized using a graphical representation.","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"387 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114125952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identity of Things (IDoT): A Preliminary Report on Identity Management Solutions for IoT Devices 物联网身份(IDoT):物联网设备身份管理解决方案初步报告
M. Misbahuddin, R. Harish, K. Ananya
{"title":"Identity of Things (IDoT): A Preliminary Report on Identity Management Solutions for IoT Devices","authors":"M. Misbahuddin, R. Harish, K. Ananya","doi":"10.1109/PKIA56009.2022.9952312","DOIUrl":"https://doi.org/10.1109/PKIA56009.2022.9952312","url":null,"abstract":"The Internet of Things poses some of the biggest security challenges in the present day. Companies, users and infrastructures are constantly under attack by malicious actors. Increasingly, attacks are being launched by hacking into one vulnerable device and hence disabling entire networks resulting in great loss. A strong identity management framework can help better protect these devices by issuing a unique identity and managing the same through its lifecycle. Identity of Things (IDoT) is a term that has been used to describe the importance of device identities in IoT networks. Since the traditional identity and access management (IAM) solutions are inadequate in managing identities for IoT, the Identity of Things (IDoT) is emerging as the solution for issuance of Identities to every type of device within the IoT IAM infrastructure. This paper presents the survey of recent research works proposed in the area of device identities and various commercial solutions offered by organizations specializing in IoT device security.","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124574823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FPGA based High Throughput Substitution Box Architectures for Lightweight Block Ciphers 基于FPGA的轻量级分组密码高吞吐量替代盒架构
Ruby Mishra, M. Okade, K. Mahapatra
{"title":"FPGA based High Throughput Substitution Box Architectures for Lightweight Block Ciphers","authors":"Ruby Mishra, M. Okade, K. Mahapatra","doi":"10.1109/PKIA56009.2022.9952325","DOIUrl":"https://doi.org/10.1109/PKIA56009.2022.9952325","url":null,"abstract":"This paper explores high throughput architectures for the substitution modules, which are an integral component of encryption algorithms. The security algorithms chosen belong to the category of lightweight crypto-primitives suitable for pervasive computing. The focus of this work is on the implementation of encryption algorithms on hardware platforms to improve speed and facilitate optimization in the area and power consumption of the design. In this work, the architecture for the encryption algorithms' substitution box (S-box) is modified using switching circuits (i.e., MUX-based) along with a logic generator and included in the overall cipher design. The modified architectures exhibit high throughput and consume less energy in comparison to the state-of-the-art designs. The percentage increase in throughput or maximum frequency differs according to the chosen algorithms discussed elaborately in this paper. The evaluation of various metrics specific to the design are executed at RFID-specific frequency so that they can be deployed in an IoT environment. The designs are mainly simulated and compared on Nexys4 DDR FPGA platform, along with a few other FPGAs, to meet similar design and implementation environments for a fair comparison. The application of the proposed S-box modification is explored for the healthcare scenario with promising results.","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131173035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PKI for IoT using the DNS infrastructure 使用DNS基础设施的物联网PKI
S. Balakrichenan, Ibrahim Ayoub, Benoît Ampeau
{"title":"PKI for IoT using the DNS infrastructure","authors":"S. Balakrichenan, Ibrahim Ayoub, Benoît Ampeau","doi":"10.1109/PKIA56009.2022.9952253","DOIUrl":"https://doi.org/10.1109/PKIA56009.2022.9952253","url":null,"abstract":"The main challenge facing IoT today is security. The constrained nature of IoT devices deprives them of using modern security solutions. This leads them to use aged and more vulnerable security mechanisms that expose them to high risks. When compared to more powerful devices, constrained IoT devices cannot use the Public Key Infrastructure with X.509 certificates to establish secure sessions. Moreover, the idea of self-signed certificates and having one trusted CA does not seem that popular. The Domain Name System (DNS) using the DNS-based Authentication of Named Entities protocol (DANE) and DNS's security extensions (DNSSEC) can help create the sought-after Public Key Infrastructure (PKI) for IoT. With a concrete example, this article explains how DNS can deliver IoT PKI functions based on DANE, backed by DNSSEC.","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133868353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study of PKI Ecosystem in South Asian and Oceania Countries 南亚和大洋洲国家PKI生态系统研究
Lavanya Palani, A. Pandey, B. Rajendran, B. Bindhumadhava, S. Sudarsan
{"title":"A Study of PKI Ecosystem in South Asian and Oceania Countries","authors":"Lavanya Palani, A. Pandey, B. Rajendran, B. Bindhumadhava, S. Sudarsan","doi":"10.1109/PKIA56009.2022.9952304","DOIUrl":"https://doi.org/10.1109/PKIA56009.2022.9952304","url":null,"abstract":"Public Key Infrastructure (PKI) as a techno-policy ecosystem for establishing electronic trust has survived for several decades and evolved as the de-facto model for centralized trust in electronic transactions. In this paper, we study the PKI ecosystem that are prevailing in the South Asian and Oceanic countries and brief them. We also look at how PKI has coped up with the rapid technological changes and how policies have been realigned or formulated to strengthen the PKI ecosystem in these countries.","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124301073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Analysis of LDPC Code-Based Encryption LDPC码加密的安全性分析
Dibyasree Guha, Debasish Bera, Sourabh Biswas
{"title":"Security Analysis of LDPC Code-Based Encryption","authors":"Dibyasree Guha, Debasish Bera, Sourabh Biswas","doi":"10.1109/PKIA56009.2022.9952322","DOIUrl":"https://doi.org/10.1109/PKIA56009.2022.9952322","url":null,"abstract":"In the search for good alternatives to classical cryptosystems with number theory as their backbone, code-based systems have emerged as a strong competitor for “Post-Quantum cryptography”. In this paper we provide a comprehensive overview on quasi-cyclic (QC) low-density parity-check (LDPC) code-based public key encryption scheme known as LEDAcrypt. It is based on McEliece cryptosystem as the building block. A comparative study of security analysis based on different information-set decoding (ISD) and performance evaluation of the said system are also carried out.","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127021412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public Key Infrastructure And Its Applications (PKIA 2022) 公钥基础设施及其应用(PKIA 2022)
{"title":"Public Key Infrastructure And Its Applications (PKIA 2022)","authors":"","doi":"10.1109/pkia56009.2022.9952320","DOIUrl":"https://doi.org/10.1109/pkia56009.2022.9952320","url":null,"abstract":"","PeriodicalId":333935,"journal":{"name":"2022 IEEE International Conference on Public Key Infrastructure and its Applications (PKIA)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126652562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信