By Topic

IET Information Security

Issue 2 • June 2012

Filter Results

Displaying Results 1 - 9 of 9
  • Attribute-based signature scheme with constant size signature in the standard model

    Publication Year: 2012, Page(s):47 - 54
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (179 KB)

    In this study, the authors propose a new efficient attribute-based signature (ABS) scheme. This scheme achieves existential unforgeability against selective predicate attack and attributes signer privacy in the standard model. The signature scheme only needs three pairing operations, and the signature size is constant, regardless of the number of attributes. Compared with other existing schemes, t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internal state recovery of grain-v1 employing normality order of the filter function

    Publication Year: 2012, Page(s):55 - 64
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (390 KB)

    A novel technique for cryptanalysis of the stream cipher Grain-v1 is given. In a particular setting, the algorithms proposed in this study provide recovery of an internal state of Grain-v1 with the expected time complexity of only 254 table look-up operations employing a memory of dimension ~270, assuming availability of 234 keystream sequences each of length 2... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Provably secure convertible multi-authenticated encryption scheme

    Publication Year: 2012, Page(s):65 - 70
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (137 KB)

    In 2009, Tsai proposed an efficient convertible multi-authenticated encryption (CMAE) scheme. However, the author shows that his scheme is distinguishable under adaptive chosen-message attack, and that the designated verifier can generate the signature of the same message for other verifiers. Since no formal model of CMAE has been presented in the literature, the author presents the first complete... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keypad against brute force attacks on smartphones

    Publication Year: 2012, Page(s):71 - 76
    Cited by:  Papers (1)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (265 KB)

    Although the powerful functions of smartphones provide much convenience for users, it causes a great damage because of loss and theft. Therefore the user has to use the phone lock provided by the smartphone. With the phone lock, the user is able to secure the time for requesting to stop the call service to the mobile telecommunication company and deleting the sensitive information with an anti-the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Light-weight trust-based routing protocol for mobile ad hoc networks

    Publication Year: 2012, Page(s):77 - 83
    Cited by:  Papers (12)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (405 KB)

    Mobile ad hoc networks (MANETs) were originally designed for a cooperative environment. To use them in hostile environments, trust-based routing can be used, where instead of establishing the shortest routes as done in traditional routing protocols, most trusted routes are established. In this study, the authors present a light-weight trust-based routing protocol. It is light-weight in the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhanced multiparty quantum secret sharing of classical messages by using entanglement swapping

    Publication Year: 2012, Page(s):84 - 92
    Cited by:  Papers (4)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (533 KB)

    Based on the multiparty quantum secret sharing (QSS) protocol called Zhang-Man protocol, the authors proposed two schemes to enhance the transmission efficiency of whole protocol. In the proposed improved protocol, the dealer can transmit double amount of secret messages at a time securely instead of doing the original Zhang-Man protocol twice. Besides, the authors save a lot of cost of whole QSS ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ladon1 : end-to-end authorisation support for resource-deprived environments

    Publication Year: 2012, Page(s):93 - 101
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (504 KB)

    The authors present Ladon, an enhanced version of Kerberos which extends the original protocol with authorisation capacity and relaxes the necessity of clock synchronisation by adding to the protocol special limited-lifetime nonces. This way, although all entities need timers, only the clocks of the two servers that constitute the key distribution centre must be synchronised with each other. The d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved certificateless signature scheme provably secure in the standard model

    Publication Year: 2012, Page(s):102 - 110
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (192 KB)

    Certificateless cryptography shares many features of identity-based cryptography and partially solves the problem of key escrow. Three certificateless signature schemes without random oracles were found in the literature. However, all the schemes suffer from some common drawbacks. First, by obtaining a signature on a message and replacing the public key of a signer, an adversary can forge valid si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Embedded system for sensor communication and security

    Publication Year: 2012, Page(s):111 - 121
    Cited by:  Papers (3)
    IEEE is not the copyright holder of this material | Click to expandAbstract | PDF file iconPDF (1278 KB)

    Inter-integrated circuit mode (I2C) software is used to communicate between sensors and on embedded control system utilising PIC182585 MPLAB hardware. These sensors were built as part of a system on-board that includes sensors, a Q2 microcontroller and interface circuitry. The hardware includes a PIC18 processor, a field programmable gate array (FPGA) chip and peripherals. The FPGA chip is used to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IET Information Security publishes original research papers in the following areas of information security and cryptography.

Full Aims & Scope

Meet Our Editors

Publisher
IET Research Journals
iet_ifs@theiet.org