A Digital Signature Scheme Secure Against Adaptive Attack

نویسندگان

  • S. G. Sandhya
  • R. Uma Maheswari
چکیده

Intentional or unintentional leakage of confidential data is undoubtedly one of the most severe security threats that organizations face in the digital era. Most of the advertisements are posted from any consumers that are displayed in social network profiles. If user clicks on the advertisements, it will redirect to another page. That page may be original or fake. If it is a fake advertisement, it automatically get your profile information and back send to hacker. So we are using two roles. That is consumer and user. If the login user name and password of the user is hacked it is easy for the hackers to get the details of user’s friend and share all their details. Consumers also register and upload your advertisements with URL. Once consumers post advertisements to particular profile that advertisements display even in user side and admin side. Admin verify that advertisements, if it verified, verified symbol displayed on image in user side. If advertisements are fake means admin not verify and block the advertisements. If same advertisements posted from same account, it automatically blocks the particular system using IP and MAC.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient certificateless signcryption scheme in the standard model

Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...

متن کامل

Signature Schemes Based on the Strong RSAAssumptionRonald

We describe and analyze a new digital signature scheme. The new scheme is quite eecient, does not require the the signer to maintain any state, and can be proven secure against adaptive chosen message attack under a reasonable intractability assumption, the so-called Strong RSA Assumption. Moreover, a hash function can be incorporated into the scheme in such a way that it is also secure in the ...

متن کامل

Certificate-Based Secure Three-Party Signcryption Scheme with Low Costs

A signcryption scheme combining public key encryption and digital signatures can simultaneously satisfy the security requirements of confidentiality, integrity, authenticity and non-repudiation. In a three-party communication environment, a message signcrypted by one party might have to be securely delivered to the other two and they usually independently decrypt the ciphertext and verify recov...

متن کامل

Signature Scheme in Multi-User Setting

Recently, Boneh and Boyen proposed a new provably secure short signature scheme under the q-strong Diffie-Hellman assumption without random oracles. This scheme is based on bilinear map which is different from Cramer-Shoup signature scheme (which is based on the strong RSA assumption). However, Tan [17] showed that BonehBoyen scheme is subjected to key substitution attacks in the multi-user set...

متن کامل

Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme

An identity-based multi-proxy signature is a type of proxy signatures in which the delegation of signing right is distributed among a number of proxy signers. In this type of cryptographic primitive, cooperation of all proxy signers in the proxy group generates the proxy signatures of roughly the same size as that of standard proxy signatures on behalf of the original signer, which is more effi...

متن کامل

Breaking and Fixing of an Identity Based Multi-Signcryption Scheme

Signcryption is a cryptographic primitive that provides authentication and confidentiality simultaneously in a single logical step. It is often required that multiple senders have to signcrypt a single message to a certain receiver. Obviously, it is inefficient to signcrypt the messages separately. An efficient alternative is to go for multi-signcryption. The concept of multi-signcryption is si...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016