Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Decoy-based information security

View through CrossRef
AbstractIn this survey, we discuss an emerging concept of decoy-based information security, or security without computational assumptions. In particular, we show how this concept can be implemented to provide security against (passive) computationally unbounded adversary in some public-key encryption protocols. In the world of symmetric cryptography, decoy-based security finds a wide range of applications, notably to secure delegation of computation to another party. We single out the scenario where a computationally limited party wants to send an encrypted message to a computationally superior party using the RSA protocol, thereby providing another kind of application of decoy ideas in a public-key setting. With typical RSA parameters, decoy-based method of delegation of computation improves the efficiency for the sender by several orders of magnitude.
Title: Decoy-based information security
Description:
AbstractIn this survey, we discuss an emerging concept of decoy-based information security, or security without computational assumptions.
In particular, we show how this concept can be implemented to provide security against (passive) computationally unbounded adversary in some public-key encryption protocols.
In the world of symmetric cryptography, decoy-based security finds a wide range of applications, notably to secure delegation of computation to another party.
We single out the scenario where a computationally limited party wants to send an encrypted message to a computationally superior party using the RSA protocol, thereby providing another kind of application of decoy ideas in a public-key setting.
With typical RSA parameters, decoy-based method of delegation of computation improves the efficiency for the sender by several orders of magnitude.

Related Results

The development of the asymmetrically dominated decoy effect in young children
The development of the asymmetrically dominated decoy effect in young children
AbstractOne classic example of context-independent violations is the asymmetrically dominated decoy effect, in which adding a decoy option (inferior option) to a set of original op...
Method for four‐channel monopulse radar to resist dual‐source angle deception jamming
Method for four‐channel monopulse radar to resist dual‐source angle deception jamming
Towed decoy can simulate the time domain and frequency domain characteristics of target in radar beam and form effective angle deception. In order to improve the radar ability to c...
Cash‐based approaches in humanitarian emergencies: a systematic review
Cash‐based approaches in humanitarian emergencies: a systematic review
This Campbell systematic review examines the effectiveness, efficiency and implementation of cash transfers in humanitarian settings. The review summarises evidence from five studi...
Public budget security administration: development of primary mechanisms
Public budget security administration: development of primary mechanisms
The current state of public administration of budget security indicates its actual absence. With the extremely important role of budget security, both in the life of the country as...
Circular Economy: Rethinking Security Sustainability Through Ransom Project
Circular Economy: Rethinking Security Sustainability Through Ransom Project
Abstract As part of PETRONAS approach to sustainability, the organization has made more concerted effort to purposefully adopt Circular Economy (CE) across PETRONAS ...
SECURITY REQUIREMENTS VALIDATION FOR MOBILE APPS: A SYSTEMATIC LITERATURE REVIEW
SECURITY REQUIREMENTS VALIDATION FOR MOBILE APPS: A SYSTEMATIC LITERATURE REVIEW
Security requirements are important to increase the confidence of mobile users to perform many online transactions, such as banking, booking and payment via mobile devices.  Object...
Decoy Interleukin-1 Receptor Antagonist on Extracellular Vesicles
Decoy Interleukin-1 Receptor Antagonist on Extracellular Vesicles
Interleukin-1 (IL-1) is an important inflammatory factor in multi-organ inflammation and tissue damage. Interleukin-1 receptor antagonist (IL-1RA) is a bioactive receptor for IL-1....
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...

Back to Top