Security Verification of an Authentication Algorithm Based on Verifiable Encryption

نویسندگان

چکیده

A new class of cryptosystems called verifiable encryption (VE) that facilitates the verification two plaintexts without decryption was proposed in our previous paper. The main contributions study include following. (1) Certain such as one-time pad belong to VE class. (2) We constructed an authentication algorithm for unlocking local devices via a network utilizes property VE. (3) As result implementing VE-based using pad, encryption, verification, and processing times are less than 1 ms even with text length 8192 bits. All personal information used is protected by Shanon’s perfect secrecy. (4) robustness against man-in-the-middle attacks plaintext discussed. However, discussion about security insufficient from following perspectives: (A) its other theoretical ciphertext-only, known-plaintext, chosen-plaintext, adaptive chosen-ciphertext, chosen-ciphertext not discussed; (B) formal analysis tools performed. In this paper, we analyze discussing above validating tool. These analyses, show known ineffective algorithm.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Verifiable Security of Boneh-Franklin Identity-Based Encryption

Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbitrary identity string as an encryption key. Since IBE does not require prior generation and distribution of keys, it greatly simplifies key management in public-key cryptography. Although the concept of IBE was introduced by Shamir in 1981, constructing a practical IBE scheme remained an open prob...

متن کامل

Verifiable Attribute Based Encryption

In this paper, we propose the notion of Verifiable Attribute-Based Encryption (VABE) and give two constructs of key-policy VABE. One is with a single authority, and the other is with multi authorities. Not only our schemes are proved secure as the previous ABE schemes, they also provide a verification property. This could not be trivially solved, such as trying random decryption. Adding the ver...

متن کامل

Enhanced Cloud Data Security Through Verifiable Cipher Policy Based Encryption

Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’ physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. In order to a...

متن کامل

Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication

In this paper, we focus on verifiability of predicate encryption. A verifiable predicate encryption scheme guarantees that all legitimate receivers of a ciphertext will obtain the same message upon decryption. While verifiability of predicate encryption might be a desirable property by itself, we furthermore show that this property enables interesting applications. Specifically, we provide two ...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Information

سال: 2023

ISSN: ['2078-2489']

DOI: https://doi.org/10.3390/info14020126