Loading...
Search for: encryption
0.007 seconds
Total 104 records

    Decentralized Multi-client Functional Encryption

    , M.Sc. Thesis Sharif University of Technology Asri, Mohammad (Author) ; Khazaii, Shahram (Supervisor)
    Abstract
    Functional encryption is a powerful primitive that enables selective computation on encrypted data. In a functional encryption scheme, a secret key is associated with a function. A user having ciphertext ct=enc(x) and private key sk_f for the function f can compute f(x) and learn nothing else. Functional encryption has two limitations: 1) parties should trust a third trusted party for the key generation process. 2) It does not support cases where the number of function inputs is more than one (potentially produced by different parties). In this thesis, it's have been reviewed works that have been done to eliminate limitations and generalize functional encryption to be more suitable for real... 

    On the security of YRL, an anonymous broadcast encryption scheme

    , Article 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 752-755 ; 9781509034345 (ISBN) Rabaninejad, R ; Ameri, M. H ; Delavar, M ; Mohajeri, J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    Broadcast encryption is a novel concept for sending a special message to a subset of users. In broadcast encryption schemes, the distribution center broadcasts the message in encrypted form and expect that only the intended users be able to decrypt the message. This concept has several applications such as pay-per-service TVs. In this paper, we investigate one of the most recent broadcast encryption schemes and show that the introduced scheme does not provide the main requirement of broadcast encryption schemes. For this purpose, we demonstrate that all of the users, including authorized and unauthorized users, can decrypt the broadcasted encrypted message. © 2016 IEEE  

    Functional Encryption

    , M.Sc. Thesis Sharif University of Technology Babaeinejad, Sasan (Author) ; Khazaei, Shahram (Supervisor)
    Abstract
    In this thesis we will focus on Functional Encryption. At first a wide range of different types of requirements and applications which are not fulfilled by Public-Key Encryption are considered. These types of requirements finally led us to Functional Encryption. Then a breaf explanation of differrent types of Functional Encryption is presented. In the sequel we will exlain Functional Encryption more formally. Finally we will consider the latest achievemnets and open problems in this area  

    Circuit design to improve security of telecommunication devices

    , Article 2015 IEEE Conference on Technologies for Sustainability, SusTech 2015, 30 July 2015 through 1 August 2015 ; Aug , 2015 , Pages 171-175 ; 9781479918010 (ISBN) Bahrami, H ; Hajsadeghi, K ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    Security in mobile handsets of telecommunication standards such as GSM, Project 25 and TETRA is very important, especially when governments and military forces use handsets and telecommunication devices. Although telecommunication could be quite secure by using encryption, coding, tunneling and exclusive channel, attackers create new ways to bypass them without the knowledge of the legitimate user. In this paper we introduce a new, simple and economical circuit to warn the user in cases where the message is not encrypted because of manipulation by attackers or accidental damage. This circuit not only consumes very low power but also is created to sustain telecommunication devices in aspect... 

    Location Privacy Preservation for Secondary Users in a Database-Driven Cognitive Radio Network

    , Article ISeCure ; Volume 14, Issue 2 , 2022 , Pages 215-227 ; 20082045 (ISSN) Salami, Z ; Ahmadian Attari, M ; Aref, M. R ; Jannati, H ; Sharif University of Technology
    Iranian Society of Cryptology  2022
    Abstract
    Since their introduction, Cognitive Radio Networks (CRN), as a new solution to the problem of spectrum scarcity, have received great attention from the research society. An important field in database-driven CRN studies is pivoted on their security issues. A critical issue in this context is user’s location privacy, which is potentially under serious threat. The query process by secondary users (SU) from the database is one of the points where the problem rises. In this paper, we propose a Privacy-Preserving Query Process (PPQP), accordingly. This method lets SUs deal in the process of spectrum query without sacrificing their location information. Analytical assessment of PPQP’s privacy... 

    Missing a trusted reference monitor: How to enforce confidential and dynamic access policies?

    , Article Communications in Computer and Information Science ; Vol. 428, issue , Oct , 2014 , p. 92-104 ; ISSN: 18650929 ; ISBN: 978-3319109022 Karimi, L ; Javadi, S. A ; Hadavi, M. A ; Jalili1, R ; Sharif University of Technology
    Abstract
    Popularity of data outsourcing and its consequent access control issues such as dynamism and efficiency is the main motivation of this paper. Existing solutions suffer from the potential unlimited number of user keys, inefficient update of policies, and disclosure of data owner’s access control policies. Using Chinese remainder theorem and proxy re-encryption together, in this paper, we propose an efficient access control enforcement mechanism based on selective encryption that addresses all the shortages. The overall architecture, required algorithms, and access control policy update are discussed. The mechanism is evaluated through simulation and, the given results are satisfactory  

    Efficient polar code-based physical layer encryption scheme

    , Article IEEE Wireless Communications Letters ; 2017 ; 21622337 (ISSN) Hooshmand, R ; Aref, M. R ; Sharif University of Technology
    Abstract
    This letter presents an efficient polar code-based physical layer encryption (PLE) scheme with a short key length in comparison to the conventional symmetric key cryptosystems. By using the properties of polar codes, we consider several efficient techniques to reduce the key length and the computational overhead of the presented PLE scheme. Moreover, the results of the security analyses show that the proposed scheme has a high level of security against conventional attacks on the PLE schemes. In fact, reducing the key length and the computational overhead of the presented PLE scheme has no effect on its security level, which makes it suitable for secure mobile communication devices with... 

    A self-synchronized chaotic image encryption scheme

    , Article Signal Processing: Image Communication ; Volume 36 , August , 2015 , Pages 106-114 ; 09235965 (ISSN) Daneshgar, A ; Khadem, B ; Sharif University of Technology
    Elsevier  2015
    Abstract
    Abstract In this paper, a word based chaotic image encryption scheme for gray images is proposed that can be used in both synchronous and self-synchronous modes. The encryption scheme operates in a finite field where we have also analyzed its performance according to numerical precision used in implementation. We show that the scheme not only passes a variety of security tests, but also it is verified that the proposed scheme operates faster than other existing schemes of the same type even when using lightweight short key sizes  

    Using Functional Encryption to Manage Encrypted Data

    , M.Sc. Thesis Sharif University of Technology Mahfoozi, Rohollah (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Recently, many organizations outsource their data on an external server to rescue the trouble of data maintenance. But, data owners do not trust in the external server to enforce defined access control policies. In recent years, many researches was dedicated to cryptographic access control on outsourced data, in order to solve this problem. We introduce a method based on Attribute-based Encryption to enforce access control on outsourced data. In this method we consider policy updating and administrative access control. As a result The owner is not only able to change access control policies on outsourced data but also to define administrative rights (grant/revoke) for some admin users. Our... 

    Dual System Encryption for Prove Security of Functional Encryption Systems

    , M.Sc. Thesis Sharif University of Technology Foroutani, Mohammad (Author) ; Khazae, Shahram (Supervisor)
    Abstract
    Today for many applications, traditional encryption systems is insufficient to find a way for them. Traditional methods have limited access to the encrypted data, as it is ”all or nothing” decryption. To overcome these limitations, some primitives such as searchable encryption, identity based encryption, attribute based encryption, predicate encryption and so on were introduced. They enable fine-grained access to encrypted data. In fact, they enable sender to control over who has access to the encrypted data and what they can learn.Functional Encryption is a general concept that these primitives can be special cases of it. Dual System Encryption opens up a new way to prove security of... 

    A key-policy attribute-based temporary keyword search scheme for secure cloud storage

    , Article IEEE Transactions on Cloud Computing ; 2018 ; 21687161 (ISSN) Ameri, M. H ; Delavar, M ; Mohajeri, J ; Salmasizadeh, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Temporary keyword search on confidential data in a cloud environment is the main focus of this research. The cloud providers are not fully trusted. So, it is necessary to outsource data in the encrypted form. In the attribute-based keyword search (ABKS) schemes, the authorized users can generate some search tokens and send them to the cloud for running the search operation. These search tokens can be used to extract all the ciphertexts which are produced at any time and contain the corresponding keyword. Since this may lead to some information leakage, it is more secure to propose a scheme in which the search tokens can only extract the ciphertexts generated in a specified time interval. To... 

    An anonymous attribute-based access control system supporting access structure update

    , Article 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2019, 28 August 2019 through 29 August 2019 ; 2019 , Pages 85-91 ; 9781728143736 (ISBN) Chegenizadeh, M ; Ali, M ; Mohajeri, J ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    It is quite common nowadays for clients to outsource their personal data to a cloud service provider. However, it causes some new challenges in the area of data confidentiality and access control. Attribute-based encryption is a promising solution for providing confidentiality and fine-grained access control in a cloud-based cryptographic system. Moreover, in some cases, to preserve the privacy of clients and data, applying hidden access structures is required. Also, a data owner should be able to update his defined access structure at any time when he is online or not. As in several real-world application scenarios like e-health systems, the anonymity of recipients, and the possibility of... 

    A fully distributed hierarchical attribute-based encryption scheme

    , Article Theoretical Computer Science ; Volume 815 , 2020 , Pages 25-46 Ali, M ; Mohajeri, J ; Sadeghi, M. R ; Liu, X ; Sharif University of Technology
    Elsevier B.V  2020
    Abstract
    With the development of cloud computing, many enterprises have been interested in outsourcing their data to cloud servers to decrease IT costs and rise capabilities of provided services. To afford confidentiality and fine-grained data access control, attribute-based encryption (ABE) was proposed and used in several cloud storage systems. However, scalability and flexibility in key delegation and user revocation mechanisms are primary issues in ABE systems. In this paper, we introduce the concept of a fully distributed revocable ciphertext-policy hierarchical ABE (FDR-CP-HABE) and design the first FDR-CP-HABE scheme. Our scheme offers a high level of flexibility and scalability in the key... 

    A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Cloud Storage

    , Article IEEE Transactions on Cloud Computing ; Volume 8, Issue 3 , 2020 , Pages 660-671 Ameri, M. H ; Delavar, M ; Mohajeri, J ; Salmasizadeh, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Temporary keyword search on confidential data in a cloud environment is the main focus of this research. The cloud providers are not fully trusted. So, it is necessary to outsource data in the encrypted form. In the attribute-based keyword search (ABKS) schemes, the authorized users can generate some search tokens and send them to the cloud for running the search operation. These search tokens can be used to extract all the ciphertexts which are produced at any time and contain the corresponding keyword. Since this may lead to some information leakage, it is more secure to propose a scheme in which the search tokens can only extract the ciphertexts generated in a specified time interval. To... 

    A compact 8-bit AES crypto-processor

    , Article 2nd International Conference on Computer and Network Technology, ICCNT 2010, 232010 through 25 April 2010 ; April , 2010 , Pages 71-75 ; 9780769540429 (ISBN) Haghighizadeh, F ; Attarzadeh, H ; Sharifkhani, M ; Sharif University of Technology
    2010
    Abstract
    Advance Encryption Standard (AES), has received significant interest over the past decade due to its performance and security level. In this paper, we propose a compact 8-bit AES crypto-processor for area constrained and low power applications where both encryption and decryption is needed. The cycle count of the design is the least among previously reported 8-bit AES architectures and the throughput is 203 Mbps. The AES core consumes 5.6k gates in 0.18 μm standard-cell CMOS technology. The power consumption of the core is 49 μW/MHz at 128 MHz which is the minimum power reported thus far  

    A secret key encryption scheme based on 1-level QC-LDPC lattices

    , Article 13th International ISC Conference on Information Security and Cryptology, ISCISC 2016, 7 September 2016 through 8 September 2016 ; 2016 , Pages 20-25 ; 9781509039494 (ISBN) Bagheri, K ; Sadeghi, M. R ; Eghlidos, T ; Panario, D ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    We introduce a new secret-key cryptosystem based on 1-level QC-LDPC integer lattices. These lattices are practically implementable in high dimensions due to their low-complexity encoding and decoding algorithms. We exploit their efficient encoding and decoding algorithms to make a significant reduction in the complexity of lattice-based cryptosystems. Furthermore, the sparseness of the corresponding parity check matrix of 1-level QC-LDPC lattices and their good error performance, make them efficient choices in real world applications. In this paper, we propose a Rao-Nam like encryption scheme using 1-level QC-LDPC lattices. Some chosen-plaintext attacks and recent results on the Rao-Nam... 

    Multi-join query optimization in bucket-based encrypted databases using an enhanced ant colony optimization algorithm

    , Article Distributed and Parallel Databases ; Volume 36, Issue 2 , 2018 , Pages 399-441 ; 09268782 (ISSN) Jafarinejad, M ; Amini, M ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    One of the organizations’ main concerns is to protect sensitive data in database systems, especially the ones outsourced to untrusted service providers. An effective solution for this issue is to employ database encryption methods. Among different encryption approaches, Bucket-based method has the advantage of balancing security and performance of database operations. However, generating false-positive results in executing queries is the main drawback of this method. On the other hand, multi-join queries are one of the most critical operations executed on these stored sensitive data. Hence, acceptable processing and response time in executing multi-join queries is required. In this paper, we... 

    A framework for protecting privacy on mobile social networks

    , Article Mobile Networks and Applications ; Volume 26, Issue 3 , 2021 , Pages 1281-1299 ; 1383469X (ISSN) Safi, S. M ; Movaghar, A ; Safikhani Mahmoodzadeh, K ; Sharif University of Technology
    Springer  2021
    Abstract
    In recent years, mobile social networks have largely been developed and gained considerable popularity. An approach to protecting privacy on mobile social networks is the use of encryption and access control. Good alternatives for use on mobile social networks are the Public Broadcast Encryption approach for appropriate concordance and consistency with the structure of social networks as well as the Attribute-Based Encryption owing to its capability and proper implementation of the access control policy. Accordingly, in this paper, a framework was presented based on the Public Broadcast Encryption and Attribute-Based Encryption. Using proxies, we outsourced some of these operations in the... 

    A Method for Searching on Encrypted Data

    , M.Sc. Thesis Sharif University of Technology Mansoori, Fatemeh (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Using database encryption to protect data in some situations where access control is not soleley enough is inevitable. Database encryption provides an additional layer of protecton to conventional access control techniques. It prevents unauthorized users, including intruders breaking into a network, from viewing the sensitive data. As a result data remains protected even in the event that database is successfully attacked or stolen. However, encryption and decryption of data result in database performance degradation. In the situation where all the information is stored in encrypted form, one cannot make the selection on the database content any more. Data should be decrypted first, so an... 

    Design of a Scalable Blockchain-based IoMT System

    , M.Sc. Thesis Sharif University of Technology Nourani Boosjin, Mohammad (Author) ; Aref, Mohammad Reza (Supervisor) ; Eghlidos, Taraneh (Supervisor)
    Abstract
    Managing health data and providing remote treatment services to patients has always faced security and privacy challenges. Because of the importance and sensitivity of this data, the use of centralized networks such as cloud space and trustin a cloud server can be dangerous, due to the lack of complete trust in the cloud server. To prevent the threats of centralized systems, we provide a decentralized blockchain-based system in which miners, in addition to authenticating physicians and patients, are also responsible for searching encrypted data and all user activities can be tracked in the distributed ledger. The proposed scheme preserves data privacy, and there is no need to trust a server....