M. Soodkhah Mohammadi; A. Ghaemi Bafghi
Abstract
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense ...
Read More
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature of our scheme is collusion resistance. Using secure multiparty computation, a traitor needs k cooperators in order to create a decryption machine. The broadcaster can choose the value of k as he decides to make a trade-off between communication complexity and collusion resistance. Comparison with other Broadcast Encryption schemes indicates enhanced performance and complexity on the part of the proposed scheme (in terms of message encryption and decryption, key storage requirements, and ciphertext size) relative to similar schemes. In addition, the scheme is modeled using applied pi calculus and its security is verified by means of an automated verification tool, i.e., ProVerif.
M. Mehrnejad; A. Ghaemi Bafghi; A. Harati; E. Toreini
Abstract
As protection of web applications are getting more and more important every day, CAPTCHAs are facing booming attention both by users and designers. Nowadays, it is well accepted that using visual concepts enhance security and usability of CAPTCHAs. There exist few major different ideas for designing ...
Read More
As protection of web applications are getting more and more important every day, CAPTCHAs are facing booming attention both by users and designers. Nowadays, it is well accepted that using visual concepts enhance security and usability of CAPTCHAs. There exist few major different ideas for designing image CAPTCHAs. Some methods apply a set of modifications such as rotations to the original image saved in the data base, to make the CAPTCHA more secure. In this paper, two different approaches for designing image based CAPTCHAs are introduced. The first one _ which is called Tagging image CAPTCHA _ is based on pre-tagged images, using geometric transformations to increase security, and the second approach tries to enhance the first one by eliminating the use of tags and relying on semantic visual concepts. In fact, recognition of upright orientation is used as a visual cue. The usability of the proposed approaches is verified using human subjects. An estimation of security is also obtained by different kinds of attacks. Further studies are done on the proposed transformations and also on the properness of each original image for each approach. Results suggest a practical Semantic Image CAPTCHA which is usable and secure compared to its peers.