Erscheinungsdatum: 12.02.2015, Medium: Taschenbuch, Einband: Kartoniert / Broschiert, Titel: Time Stamped Proxy Blind Signature Scheme with Proxy Revocation, Autor: Panda, Suryakanta, Verlag: LAP Lambert Academic Publishing, Sprache: Englisch, Schlagworte: Computernetzwerke und maschinelle Kommunikation, Rubrik: Datenkommunikation // Netze, Mailboxen, Seiten: 60, Informationen: Paperback, Gewicht: 106 gr, Verkäufer: averdo
Proxy Blind Multi-Signature Scheme ab 48.99 € als Taschenbuch: Proxy Blind Multi-signature Scheme Using Elliptic Curve Cryptography for Handheld Devices. Aus dem Bereich: Bücher, English, International, Gebundene Ausgaben,
Time Stamped Proxy Blind Signature Scheme with Proxy Revocation ab 39.99 € als Taschenbuch: . Aus dem Bereich: Bücher, English, International, Gebundene Ausgaben,
Thanks to IP (Internet Protocol) telephony, voice, data, and video can be exchanged using the same communication infrastructure. Most Internet users have become familiar with IP telephony thanks to the popularity of applications like Skype. VoIP relies on a variety of protocols, including signaling protocols such as SIP, H323 and media stream transport protocols such as RTP. Our work is mainly based on SIP (Session Initiation Protocol). In order to circumvent all drawbacks of centralized systems on which SIP relies, a Peer-to-Peer (P2P) SIP-based communication system was proposed. Many research activities are being carried out on the integration of P2P principles into SIP to capitalize on the benefits of decentralization. We contribute to research activities on P2P SIP by proposing a novel architecture that achieves interoperability and ensures portability. Moreover, our proposal contains efficient proxy topology building and routing mechanisms. Furthermore, we define a NAT traversal solution to allow effective transmission of SIP signaling messages and media streams in presence of NAT devices. Finally, we propose a secure signaling messages routing scheme in our P2P SIP framework.
High Quality Content by WIKIPEDIA articles! PERMIS (PrivilEge and Role Management Infrastructure Standards) is a sophisticated policy-based authorisation system that implements an enhanced version of the U.S. National Institute of Standards and Technology (NIST) standard Role-Based Access Control (RBAC) model. PERMIS supports the distributed assignment of both roles and attributes to users by multiple distributed attribute authorities, unlike the NIST model which assumes the centralised assignment of roles to users. PERMIS provides a cryptographically secure privilege management infrastructure (PMI) using public key encryption technologies and X.509 Attribute certificates to maintain users' attributes. PERMIS does not provide any authentication mechanism, but leaves it up to the application to determine what to use. PERMIS's strength comes from its ability to be integrated into virtually any application and any authentication scheme like Shibboleth (Internet2), Kerberos, username/passwords, Grid proxy certificates and Public Key Infrastructure (PKI).
Proxy blind signature combines both the properties of blind signature and proxy signature. In a proxy blind signature scheme, the proxy signer is allowed to generate a blind signature on behalf of the original signer. It gives a detail about the proxy blind signature scheme with proxy revocation which records the time stamp during proxy signing phase, based on Discrete logarithmic problem and one of its application in e-voting.
This articles describes an efficient proxy blindmulti-signature scheme using Elliptic CurveCryptography. Also describes its implementationissues i.e efficiency and size of the hardware. InECC, computationally the most expensive operation isscalar multiplication and also very important fromsecurity point of view. The implementation attacksgenerally target the computation of this operation tobreak the cryptosystem. The security of the proposedschemes is based on the difficulty of breaking theone-way hash function and the elliptic curve discretelogarithm problem (ECDLP). Best algorithm knownsolving ECDLP takes fully-exponential time. Incontrast sub-exponential time algorithms known forIFP and DLP. The attractiveness of ECC will increaserelative to other public-key cryptosystems, ascomputing power improvements force a general increasein the key size. The benefits of this higher-strengthper-bit include higher speeds, lower powerconsumption, bandwidth savings and storageefficiencies. The proposed scheme can be implementedin mobile devices such as smart card, PDA etc wherebandwidth,processing capacity, power availability, orstorage are constrained.
This book contributes to the variants of proxy signature scheme based on ECDLP without pairing. Significance of the scheme in chapters is not only to provide a secure and improved signature protocol but to enhance the efficiency of the scheme in the sense of computational operation-time with compare to the other available ID-based proxy signature schemes from pairings. These schemes do not use pairings still provid signatures in ID based settings. I believe that these signature schemes with formal security model without bilinear pairings will be helpful to bring a breakthrough towards the improvement of efficiency and security proofs of such schemes. I also believe that this work will be helpful for new researchers to enhance their interest in this field and to extend the related research in future with a vast list of references.
In Fednet, there are two approaches for providing the services. One is overlay and the other is proxy-based. Each of the approaches has the advantages and drawbacks. To trade off between these two approaches, we propose a new scheme, which can make the way of service provisioning in Fednet flexible and adaptable to the changing environment and the user s preference. Some modules are designed in the Fednet agent (FA), Fednet manager (FM) and the service proxy to support our new mechanism. To fully illustrate the concept of Fednet and the service provisioning in Fednet, we implement a Fednet prototype. It shows us how the Fednet is formed and how messages are exchanged between the FA and the FM. With the aim of proving our decision making algorithms can make decisions according to the user s requirements and the changing context, some simulations and a real test bed experiment based on one or two parameters are carried out. The simulations results show that our new service provisioning mechanism could make the way of service provisioning flexible and adaptable as we have expected.