Decryption

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 22542 Experts worldwide ranked by ideXlab platform

Jian Tang - One of the best experts on this subject based on the ideXlab platform.

  • The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock.
    Sensors, 2009
    Co-Authors: Weiping Zhang, Wenyuan Chen, Jian Tang
    Abstract:

    In this paper, a novel portable hard-disk encryption/Decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/Decryption module. The portable hard-disk encryption/Decryption system is composed of the authentication module, the USB portable hard-disk interface card, the ATA protocol command decoder module, the data encryption/Decryption module, the cipher key management module, the MEMS coded lock controlling circuit module, the MEMS coded lock and the hard disk. The ATA protocol circuit, the MEMS control circuit and AES encryption/Decryption circuit are designed and realized by FPGA(Field Programmable Gate Array). The MEMS coded lock with two couplers and two groups of counter-meshing-gears (CMGs) are fabricated by a LIGA-like process and precision engineering method. The whole prototype was fabricated and tested. The test results show that the user's password could be correctly discriminated by the MEMS coded lock, and the AES encryption module could get the key from the MEMS coded lock. Moreover, the data in the hard-disk could be encrypted or decrypted, and the read-write speed of the dataflow could reach 17 MB/s in Ultra DMA mode.

  • the development of a portable hard disk encryption Decryption system with a mems coded lock
    Sensors, 2009
    Co-Authors: Weiping Zhang, Wenyuan Chen, Jian Tang
    Abstract:

    In this paper, a novel portable hard-disk encryption/Decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/Decryption module. The portable hard-disk encryption/Decryption system is composed of the authentication module, the USB portable hard-disk interface card, the ATA protocol command decoder module, the data encryption/Decryption module, the cipher key management module, the MEMS coded lock controlling circuit module, the MEMS coded lock and the hard disk. The ATA protocol circuit, the MEMS control circuit and AES encryption/Decryption circuit are designed and realized by FPGA(Field Programmable Gate Array). The MEMS coded lock with two couplers and two groups of counter-meshing-gears (CMGs) are fabricated by a LIGA-like process and precision engineering method. The whole prototype was fabricated and tested. The test results show that the user's password could be correctly discriminated by the MEMS coded lock, and the AES encryption module could get the key from the MEMS coded lock. Moreover, the data in the hard-disk could be encrypted or decrypted, and the read-write speed of the dataflow could reach 17 MB/s in Ultra DMA mode.

Weiping Zhang - One of the best experts on this subject based on the ideXlab platform.

  • The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock.
    Sensors, 2009
    Co-Authors: Weiping Zhang, Wenyuan Chen, Jian Tang
    Abstract:

    In this paper, a novel portable hard-disk encryption/Decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/Decryption module. The portable hard-disk encryption/Decryption system is composed of the authentication module, the USB portable hard-disk interface card, the ATA protocol command decoder module, the data encryption/Decryption module, the cipher key management module, the MEMS coded lock controlling circuit module, the MEMS coded lock and the hard disk. The ATA protocol circuit, the MEMS control circuit and AES encryption/Decryption circuit are designed and realized by FPGA(Field Programmable Gate Array). The MEMS coded lock with two couplers and two groups of counter-meshing-gears (CMGs) are fabricated by a LIGA-like process and precision engineering method. The whole prototype was fabricated and tested. The test results show that the user's password could be correctly discriminated by the MEMS coded lock, and the AES encryption module could get the key from the MEMS coded lock. Moreover, the data in the hard-disk could be encrypted or decrypted, and the read-write speed of the dataflow could reach 17 MB/s in Ultra DMA mode.

  • the development of a portable hard disk encryption Decryption system with a mems coded lock
    Sensors, 2009
    Co-Authors: Weiping Zhang, Wenyuan Chen, Jian Tang
    Abstract:

    In this paper, a novel portable hard-disk encryption/Decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/Decryption module. The portable hard-disk encryption/Decryption system is composed of the authentication module, the USB portable hard-disk interface card, the ATA protocol command decoder module, the data encryption/Decryption module, the cipher key management module, the MEMS coded lock controlling circuit module, the MEMS coded lock and the hard disk. The ATA protocol circuit, the MEMS control circuit and AES encryption/Decryption circuit are designed and realized by FPGA(Field Programmable Gate Array). The MEMS coded lock with two couplers and two groups of counter-meshing-gears (CMGs) are fabricated by a LIGA-like process and precision engineering method. The whole prototype was fabricated and tested. The test results show that the user's password could be correctly discriminated by the MEMS coded lock, and the AES encryption module could get the key from the MEMS coded lock. Moreover, the data in the hard-disk could be encrypted or decrypted, and the read-write speed of the dataflow could reach 17 MB/s in Ultra DMA mode.

Wenyuan Chen - One of the best experts on this subject based on the ideXlab platform.

  • The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock.
    Sensors, 2009
    Co-Authors: Weiping Zhang, Wenyuan Chen, Jian Tang
    Abstract:

    In this paper, a novel portable hard-disk encryption/Decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/Decryption module. The portable hard-disk encryption/Decryption system is composed of the authentication module, the USB portable hard-disk interface card, the ATA protocol command decoder module, the data encryption/Decryption module, the cipher key management module, the MEMS coded lock controlling circuit module, the MEMS coded lock and the hard disk. The ATA protocol circuit, the MEMS control circuit and AES encryption/Decryption circuit are designed and realized by FPGA(Field Programmable Gate Array). The MEMS coded lock with two couplers and two groups of counter-meshing-gears (CMGs) are fabricated by a LIGA-like process and precision engineering method. The whole prototype was fabricated and tested. The test results show that the user's password could be correctly discriminated by the MEMS coded lock, and the AES encryption module could get the key from the MEMS coded lock. Moreover, the data in the hard-disk could be encrypted or decrypted, and the read-write speed of the dataflow could reach 17 MB/s in Ultra DMA mode.

  • the development of a portable hard disk encryption Decryption system with a mems coded lock
    Sensors, 2009
    Co-Authors: Weiping Zhang, Wenyuan Chen, Jian Tang
    Abstract:

    In this paper, a novel portable hard-disk encryption/Decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/Decryption module. The portable hard-disk encryption/Decryption system is composed of the authentication module, the USB portable hard-disk interface card, the ATA protocol command decoder module, the data encryption/Decryption module, the cipher key management module, the MEMS coded lock controlling circuit module, the MEMS coded lock and the hard disk. The ATA protocol circuit, the MEMS control circuit and AES encryption/Decryption circuit are designed and realized by FPGA(Field Programmable Gate Array). The MEMS coded lock with two couplers and two groups of counter-meshing-gears (CMGs) are fabricated by a LIGA-like process and precision engineering method. The whole prototype was fabricated and tested. The test results show that the user's password could be correctly discriminated by the MEMS coded lock, and the AES encryption module could get the key from the MEMS coded lock. Moreover, the data in the hard-disk could be encrypted or decrypted, and the read-write speed of the dataflow could reach 17 MB/s in Ultra DMA mode.

Jian Weng - One of the best experts on this subject based on the ideXlab platform.

  • key regeneration free ciphertext policy attribute based encryption and its application
    Information Sciences, 2020
    Co-Authors: Robert H Deng, Baodong Qin, Hui Cui, Jian Weng
    Abstract:

    Abstract Attribute-based encryption (ABE) provides a promising solution for enabling scalable access control over encrypted data stored in the untrusted servers (e.g., cloud) due to its ability to perform data encryption and Decryption defined over descriptive attributes. In order to bind different components which correspond to different attributes in a user’s attribute-based Decryption key together, key randomization technique has been applied in most existing ABE schemes. This randomization method, however, also empowers a user the capability of regenerating a newly randomized Decryption key over a subset of the attributes associated with the original Decryption key. Because key randomization breaks the linkage between this newly generated key and the original key, a malicious user could leak the new Decryption key to others without taking any responsibility for the key abuse. To solve this problem, we think of key regeneration-free ABE to disallow a user from randomizing his/her Decryption key in any manner, i.e., a user can only delegate his/her Decryption key in exactly the same form without any modification so that any abused or pirated key can be traced back to its original owner. Motivated by strongly unforgeable signature, we first define a security notion called strong key unforgeability, and show that ABE schemes equipped with the strong key unforgeability are immune to key regeneration. We then provide a generic transformation to convert ciphertext-policy ABE (CP-ABE) schemes of certain type to key regeneration-free CP-ABE schemes, and show how the transformation works by presenting two concrete constructions.

  • generic and efficient constructions of attribute based encryption with verifiable outsourced Decryption
    IEEE Transactions on Dependable and Secure Computing, 2016
    Co-Authors: Xianping Mao, Junzuo Lai, Qixiang Mei, Kefei Chen, Jian Weng
    Abstract:

    Attribute-based encryption (ABE) provides a mechanism for complex access control over encrypted data. However in most ABE systems, the ciphertext size and the Decryption overhead, which grow with the complexity of the access policy, are becoming critical barriers in applications running on resource-limited devices. Outsourcing Decryption of ABE ciphertexts to a powerful third party is a reasonable manner to solve this problem. Since the third party is usually believed to be untrusted, the security requirements of ABE with outsourced Decryption should include privacy and verifiability. Namely, any adversary including the third party should learn nothing about the encrypted message, and the correctness of the outsourced Decryption is supposed to be verified efficiently. We propose generic constructions of CPA-secure and RCCA-secure ABE systems with verifiable outsourced Decryption from CPA-secure ABE with outsourced Decryption, respectively. We also instantiate our CPA-secure construction in the standard model and then show an implementation of this instantiation. The experimental results show that, compared with the existing scheme, our CPA-secure construction has more compact ciphertext and less computational costs. Moreover, the techniques involved in the RCCA-secure construction can be applied in generally constructing CCA-secure ABE, which we believe to be of independent interest.

  • attribute based encryption with verifiable outsourced Decryption
    IEEE Transactions on Information Forensics and Security, 2013
    Co-Authors: Junzuo Lai, Robert H Deng, Chaowen Guan, Jian Weng
    Abstract:

    Attribute-based encryption (ABE) is a public-key-based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes associated with private keys and ciphertexts. One of the main efficiency drawbacks of the existing ABE schemes is that Decryption involves expensive pairing operations and the number of such operations grows with the complexity of the access policy. Recently, Green et al. proposed an ABE system with outsourced Decryption that largely eliminates the Decryption overhead for users. In such a system, a user provides an untrusted server, say a cloud service provider, with a transformation key that allows the cloud to translate any ABE ciphertext satisfied by that user's attributes or access policy into a simple ciphertext, and it only incurs a small computational overhead for the user to recover the plaintext from the transformed ciphertext. Security of an ABE system with outsourced Decryption ensures that an adversary (including a malicious cloud) will not be able to learn anything about the encrypted message; however, it does not guarantee the correctness of the transformation done by the cloud. In this paper, we consider a new requirement of ABE with outsourced Decryption: verifiability. Informally, verifiability guarantees that a user can efficiently check if the transformation is done correctly. We give the formal model of ABE with verifiable outsourced Decryption and propose a concrete scheme. We prove that our new scheme is both secure and verifiable, without relying on random oracles. Finally, we show an implementation of our scheme and result of performance measurements, which indicates a significant reduction on computing resources imposed on users.

  • accountable authority identity based encryption with public traceability
    The Cryptographers’ Track at the RSA Conference, 2013
    Co-Authors: Junzuo Lai, Robert H Deng, Yunlei Zhao, Jian Weng
    Abstract:

    At Crypto'07, Goyal introduced the notion of accountable authority identity-based encryption (A-IBE) in order to mitigate the inherent key escrow problem in identity-based encryption, and proposed two concrete constructions. In an A-IBE system, if the private key generator (PKG) distributes a Decryption key or produces an unauthorized Decryption box for a user maliciously, it runs the risk of being caught and sued in the court of law with the help of a tracing algorithm. Subsequent efforts focused on constructions of A-IBE schemes with enhanced security. In these A-IBE constructions, the tracing algorithm needs to take a user's Decryption key as input. If the user lost his key or is deliberately uncooperative in court, then we cannot implicate the PKG or the user. An interesting open problem left by Goyal et al. at CCS'08 is to consider the possibility of tracing a Decryption box using only a public tracing key, or with the assistance of a tracing authority. In this paper, we address this problem positively. We first extend the original model of A-IBE to accommodate public traceability, and then propose an A-IBE scheme in the new model. To the best of our knowledge, the proposed scheme is the first A-IBE with public traceability.

Robert H Deng - One of the best experts on this subject based on the ideXlab platform.

  • key regeneration free ciphertext policy attribute based encryption and its application
    Information Sciences, 2020
    Co-Authors: Robert H Deng, Baodong Qin, Hui Cui, Jian Weng
    Abstract:

    Abstract Attribute-based encryption (ABE) provides a promising solution for enabling scalable access control over encrypted data stored in the untrusted servers (e.g., cloud) due to its ability to perform data encryption and Decryption defined over descriptive attributes. In order to bind different components which correspond to different attributes in a user’s attribute-based Decryption key together, key randomization technique has been applied in most existing ABE schemes. This randomization method, however, also empowers a user the capability of regenerating a newly randomized Decryption key over a subset of the attributes associated with the original Decryption key. Because key randomization breaks the linkage between this newly generated key and the original key, a malicious user could leak the new Decryption key to others without taking any responsibility for the key abuse. To solve this problem, we think of key regeneration-free ABE to disallow a user from randomizing his/her Decryption key in any manner, i.e., a user can only delegate his/her Decryption key in exactly the same form without any modification so that any abused or pirated key can be traced back to its original owner. Motivated by strongly unforgeable signature, we first define a security notion called strong key unforgeability, and show that ABE schemes equipped with the strong key unforgeability are immune to key regeneration. We then provide a generic transformation to convert ciphertext-policy ABE (CP-ABE) schemes of certain type to key regeneration-free CP-ABE schemes, and show how the transformation works by presenting two concrete constructions.

  • attribute based encryption with efficient verifiable outsourced Decryption
    IEEE Transactions on Information Forensics and Security, 2015
    Co-Authors: Baodong Qin, Robert H Deng, Shengli Liu
    Abstract:

    Attribute-based encryption (ABE) with outsourced Decryption not only enables fine-grained sharing of encrypted data, but also overcomes the efficiency drawback (in terms of ciphertext size and Decryption cost) of the standard ABE schemes. In particular, an ABE scheme with outsourced Decryption allows a third party (e.g., a cloud server) to transform an ABE ciphertext into a (short) El Gamal-type ciphertext using a public transformation key provided by a user so that the latter can be decrypted much more efficiently than the former by the user. However, a shortcoming of the original outsourced ABE scheme is that the correctness of the cloud server’s transformation cannot be verified by the user. That is, an end user could be cheated into accepting a wrong or maliciously transformed output. In this paper, we first formalize a security model of ABE with verifiable outsourced Decryption by introducing a verification key in the output of the encryption algorithm. Then, we present an approach to convert any ABE scheme with outsourced Decryption into an ABE scheme with verifiable outsourced Decryption. The new approach is simple, general, and almost optimal. Compared with the original outsourced ABE, our verifiable outsourced ABE neither increases the user’s and the cloud server’s computation costs except some nondominant operations (e.g., hash computations), nor expands the ciphertext size except adding a hash value (which is et al .’s ciphertext-policy ABE scheme with outsourced Decryption, and provide a detailed performance evaluation to demonstrate the advantages of our approach.

  • attribute based encryption with verifiable outsourced Decryption
    IEEE Transactions on Information Forensics and Security, 2013
    Co-Authors: Junzuo Lai, Robert H Deng, Chaowen Guan, Jian Weng
    Abstract:

    Attribute-based encryption (ABE) is a public-key-based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes associated with private keys and ciphertexts. One of the main efficiency drawbacks of the existing ABE schemes is that Decryption involves expensive pairing operations and the number of such operations grows with the complexity of the access policy. Recently, Green et al. proposed an ABE system with outsourced Decryption that largely eliminates the Decryption overhead for users. In such a system, a user provides an untrusted server, say a cloud service provider, with a transformation key that allows the cloud to translate any ABE ciphertext satisfied by that user's attributes or access policy into a simple ciphertext, and it only incurs a small computational overhead for the user to recover the plaintext from the transformed ciphertext. Security of an ABE system with outsourced Decryption ensures that an adversary (including a malicious cloud) will not be able to learn anything about the encrypted message; however, it does not guarantee the correctness of the transformation done by the cloud. In this paper, we consider a new requirement of ABE with outsourced Decryption: verifiability. Informally, verifiability guarantees that a user can efficiently check if the transformation is done correctly. We give the formal model of ABE with verifiable outsourced Decryption and propose a concrete scheme. We prove that our new scheme is both secure and verifiable, without relying on random oracles. Finally, we show an implementation of our scheme and result of performance measurements, which indicates a significant reduction on computing resources imposed on users.

  • accountable authority identity based encryption with public traceability
    The Cryptographers’ Track at the RSA Conference, 2013
    Co-Authors: Junzuo Lai, Robert H Deng, Yunlei Zhao, Jian Weng
    Abstract:

    At Crypto'07, Goyal introduced the notion of accountable authority identity-based encryption (A-IBE) in order to mitigate the inherent key escrow problem in identity-based encryption, and proposed two concrete constructions. In an A-IBE system, if the private key generator (PKG) distributes a Decryption key or produces an unauthorized Decryption box for a user maliciously, it runs the risk of being caught and sued in the court of law with the help of a tracing algorithm. Subsequent efforts focused on constructions of A-IBE schemes with enhanced security. In these A-IBE constructions, the tracing algorithm needs to take a user's Decryption key as input. If the user lost his key or is deliberately uncooperative in court, then we cannot implicate the PKG or the user. An interesting open problem left by Goyal et al. at CCS'08 is to consider the possibility of tracing a Decryption box using only a public tracing key, or with the assistance of a tracing authority. In this paper, we address this problem positively. We first extend the original model of A-IBE to accommodate public traceability, and then propose an A-IBE scheme in the new model. To the best of our knowledge, the proposed scheme is the first A-IBE with public traceability.