A File Protection System Based on a Trapdoor One-way Hash Function
نویسندگان
چکیده
The information protection of database is a crucial challenge in computer science. It ensures that any access to information kept in database is authorized, thus preventing data from unauthorized altering, destroying, and modification. We propose a novel and simple information protection scheme in this paper. The main operations of this system are ceilings and floors functions on integer. The security of our scheme is based on the difficulty on breaking a trapdoor one-way hash function. In our scheme, a database manager needs to conduct an inner product between the protected information and the enciphering key to encrypt a record of the database. On the other hand, the manager is able to decrypt the record by conducting a multiplication and a modulus operation. Key-Words: File protection, Trapdoor one-way hash function, Access control, Privacy
منابع مشابه
A Secure Chameleon Hash Function without Key Exposure from Pairings
Chameleon signatures are based on well established hash-and-sign paradigm, where a chameleon hash function is used to compute the cryptographic message digest, and becomes an important building block. The chameleon hash function is a trapdoor one-way hash function with some special properties, and plays an important role in constructing chameleon signature. In the paper, we propose a new chamel...
متن کاملID-Based Chameleon Hashes from Bilinear Pairings
Chameleon hash function is a trapdoor one-way hash function. The IDbased chameleon hash function was first introduced by Ateniese and Medeiros [1]. As discussed by [1], the general advantages of ID-based cryptography over conventional cryptography with respect to key distribution are even more pronounced in a chameleon hashing scheme, because the owner of a public key does not necessarily need ...
متن کاملA NEW SECRET SHARING SCHEME ADVERSARY FUZZY STRUCTURE BASED ON AUTOMATA
In this paper,we introduce a new verifiable multi-use multi-secretsharing scheme based on automata and one-way hash function. The scheme has theadversary fuzzy structure and satisfy the following properties:1) The dealer can change the participants and the adversary fuzzy structure without refreshing any participants' real-shadow. 2) The scheme is based on the inversion of weakly invertible fin...
متن کاملThe Changing Nature of Chameleon Signature Schemes
Chameleon Signatures are based on the traditional hash-and-sign paradigm. A secure scheme provides the properties of non-transferability and non-repudiation. That is, the contents of the message may not be disclosed without the signer’s consent. The scheme also creates an undeniable commitment on the part of the signer to the message. The chameleon hash function is a trapdoor one-way function, ...
متن کاملSponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message
OAEP and other similar schemes proven secure in Random-Oracle Model require one or more hash functions with output size larger than those of standard hash functions. In this paper, we show that by utilizing popular Sponge constructions in OAEP framework, we can eliminate the need of such hash functions. We provide a new scheme in OAEP framework based on Sponge construction and call our scheme S...
متن کامل