Advances in Information and Computer Security: 10th by Keisuke Tanaka, Yuji Suga

By Keisuke Tanaka, Yuji Suga

This e-book constitutes the complaints of the tenth foreign Workshop on protection, IWSEC 2015, held in Nara, Japan, in August 2015. The 18 complete papers and three brief papers provided during this quantity have been conscientiously reviewed and chosen from fifty eight submissions. They have been prepared in topical sections named: identity-based encryption; elliptic curve cryptography; factoring; symmetric cryptanalysis; provable safeguard; LWE-based encryption; privacy-preserving and anonymity; safe protocol; platforms safeguard; and safety in hardware.

Show description

Read Online or Download Advances in Information and Computer Security: 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings PDF

Similar international_1 books

Universal Access in Human-Computer Interaction. Aging and Assistive Environments: 8th International Conference, UAHCI 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014, Proceedings, Part III

The four-volume set LNCS 8513-8516 constitutes the refereed complaints of the eighth overseas convention on common entry in Human-Computer interplay, UAHCI 2014, held as a part of the sixteenth foreign convention on Human-Computer interplay, HCII 2014, held in Heraklion, Crete, Greece in June 2014, together with 14 different thematically related meetings.

3rd International Conference on Nanotechnologies and Biomedical Engineering: ICNBME-2015, September 23-26, 2015, Chisinau, Republic of Moldova

This quantity provides the lawsuits of the third overseas convention on Nanotechnologies and Biomedical Engineering which was once hung on September 23-26, 2015 in Chisinau, Republic of Moldova. ICNBME-2015 keeps the sequence of overseas meetings within the box of nanotechnologies and biomedical engineering.

Additional info for Advances in Information and Computer Security: 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings

Sample text

Then, it outputs the key update kuID|k−1 ,T . DKGen(skID|k , kuID|k−1 ,T ): This algorithm takes as input skID|k of ID|k and kuID|k−1 ,T , and outputs the decryption key dkID|k ,T of ID|k at time T if ID|k is not revoked at T by the parent. Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption 25 Enc(M, ID, T ): This algorithm takes as input a message M , ID and the current time T and outputs the ciphertext CT. Dec(CT, dkID,T ): This algorithm takes as input CT and dkID,T , and outputs the message.

Next, a secret key is changed to be semi-functional one by one. Though each skID contains O(log N )-size subkeys, we replace all subkeys simultaneously since the differences of subkeys are randomness part only. Finally, the plaintext of the challenge ciphertext is replaced as a random value. As the most different point between HIBE and RHIBE, an adversary is allowed to obtain the secret key of the challenge identity (or its ancestors). In the scheme, for history-free update, no ancestor’s secret value is contained in secret keys.

Z ,θ 35 = a0 I0 + · · · + aj Ij + b, and chooses rθ , zθ , tθ , wθ , $ ← Zn for each θ, and computes T w (Pθ−1 g α (uI00 · · · ujj h)rθ (u h )tθ (Y2 Y3 )zθ zk , g rθ (Y2 Y3 )wθ zk , g tθ X3 θ , I θ (Y2 Y3 )zj+1,θ zk , . . , urθ (Y2 Y3 )z ,θ zk ) urj+1 θ . For the i-th secret key query ID|j where ID|j = (I0 , . . , Ij ) and i < k, B generates a semi-functional secret key skID|j as follows. B sets zk = a0 I0 + · · · + aj Ij + b, chooses rθ , zθ , tθ , wθ , wθ , zj+1,θ , . . , z ,θ $ ← Zn for each θ, and computes T w (Pθ (uI00 · · · ujj h)rθ (u h )tθ (Y2 Y3 )zθ zk , g rθ (Y2 Y3 )wθ zk , g tθ X3 θ , I θ (Y2 Y3 )zj+1,θ zk , .

Download PDF sample

Rated 4.21 of 5 – based on 9 votes