scholarly journals A Novel Dual Authenticated Encryption Scheme Suitable for Social Networking Services

2019 ◽  
Vol 9 (7) ◽  
pp. 1452
Author(s):  
Han-Yu Lin

Nowadays there are many social networking services supporting three-party communication such as Skype, Line, and Facebook Messenger. To ensure the message security, a cryptographic encryption scheme is a commonly adopted measure. However, the traditional asymmetric encryption only allows one designated recipient to decrypt the ciphertext with his/her private key. It is thus difficult for two parties to share the same ciphertext without exposing their private keys. In this paper, the author comes up with a novel dual authenticated encryption (DAE) scheme designed for three-party communication environments. Specifically, a DAE scheme enables a party to generate a single ciphertext that could be solely decrypted by the other two participants without sharing their private keys. It is also formally shown that the proposed scheme achieves the crucial security properties using the random oracle proof model.

Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1389
Author(s):  
Jiwon Lee ◽  
Jihye Kim ◽  
Hyunok Oh

In public key broadcast encryption, anyone can securely transmit a message to a group of receivers such that privileged users can decrypt it. The three important parameters of the broadcast encryption scheme are the length of the ciphertext, the size of private/public key, and the performance of encryption/decryption. It is suggested to decrease them as much as possible; however, it turns out that decreasing one increases the other in most schemes. This paper proposes a new broadcast encryption scheme for tiny Internet of Things (IoT) equipment (BESTIE), minimizing the private key size in each user. In the proposed scheme, the private key size is O(logn), the public key size is O(logn), the encryption time per subset is O(logn), the decryption time is O(logn), and the ciphertext text size is O(r), where n denotes the maximum number of users, and r indicates the number of revoked users. The proposed scheme is the first subset difference-based broadcast encryption scheme to reduce the private key size O(logn) without sacrificing the other parameters. We prove that our proposed scheme is secure under q-Simplified Multi-Exponent Bilinear Diffie-Hellman (q-SMEBDH) in the standard model.


Symmetry ◽  
2019 ◽  
Vol 11 (5) ◽  
pp. 605
Author(s):  
Han-Yu Lin

The Traditional Authenticated Encryption (AE) scheme is a single-user cryptographic mechanism which only enables one designated verifier to authenticate the ciphertext. Although several group-oriented AE variants have also been proposed to eliminate such a limitation, they require shared verification. This motivated us to think of a scenario of three-party communication environments where each party runs independent processes without cooperation. In this paper, we realize a novel three-party AE (abbreviated to TPAE) scheme in which two designated verifiers can solely decrypt the same ciphertext and then inspect the validity of embedded signature. Additionally, we also show that our TPAE construction is computationally secure using the well-defined IND-CCA2 and the EF-CMA adversary games in the proof model of random oracles. The comparison results will demonstrate the computational efficiency of our mechanism.


Author(s):  
Shoulin Yin ◽  
Lin Teng ◽  
Jie Liu

<p><em>Searchable asymmetric encryption (SAE) can also be called Public Key Encryption with Keyword Search (PEKS), which allows us to search the keyword on the data of having been encrypted. The essence of Asymmetric searchable encryption is that users exchange the data of encryption, one party sends a ciphertext with key encryption, the other party with another key receives the ciphertext. Encryption key is not the same as the decryption key, and cannot deduce another key from any one of the key, thus it greatly enhances the information protection, and can prevent leakage the user's search criteria<span style="font-family: 宋体;">—</span><span style="font-family: 'Times New Roman';">Search Pattern. Secure schemes of SAE are practical, sometimes, however the speed of encryption/decryption in Public-key encryption is slower than private key. In order to get higher efficiency and security in information retrieval, in this paper we introduce the concept of distributed SAE, which is useful for security and can enable search operations on encrypted data. Moreover, we give the proof of security.</span></em><em></em></p>


HUMANIS ◽  
2019 ◽  
pp. 244
Author(s):  
Ayu Mitha Permatasari ◽  
Ida Bagus Putra Yadnya ◽  
Ni Ketut Alit Ida Setianingsih

The title of this study is “Slang Words on Instagram Hashtags”. This study is focused on analyzing types of slang and the literal and figurative meanings of slang words on Instagram Hashtag. The data were taken from the hashtag in an Instagram post, Instagram itself was an online mobile photo-sharing, video sharing, and social networking services. Documentation method was used to collect the data and for the technique of collecting the data, note taking was used. The method and technique of analyzing the data, it was using descriptive qualitative method and analyzed based on the theoretical framework. For presenting the data, the data was presented descriptively. This study applied two theories which are the theory proposed by Allan and Burridge (2006) which focus on types of meaning consist of fresh and creative, imitative, flippant, acronym and clipping also the theory proposed by Hayes (1977) in the literal meaning and figurative meaning. Based on the data analysis, it can be seen that the fresh and creative types of slang were the most used in the Instagram hashtag and the other types of slang, are also used in the Instagram hashtag but not as much as fresh and creative. In additional, the literal meaning is based on the dictionary and the figurative meaning affected by context.


2019 ◽  
Author(s):  
Jungu Kim ◽  
Su Cheol Kim ◽  
Jaegwon Jeong ◽  
Myeong Gyu Kim

BACKGROUND Methylphenidate, a stimulant used to treat attention deficit hyperactivity disorder (ADHD), has the potential for nonmedical uses such as study and recreation. In the era of active use of social networking services (SNSs), experience with the nonmedical use or side effects of methylphenidate might be shared on Twitter. OBJECTIVE To analyze monthly tweets about methylphenidate, its nonmedical use and side effects, and user sentiments about methylphenidate. METHODS Tweets mentioning methylphenidate from August 2018 to July 2019 were collected using search terms for methylphenidate and its brand names. Only tweets written in English were included. The monthly number of tweets about methylphenidate and the number of tweets containing keywords related to the nonmedical use and side effects of methylphenidate were analyzed. Precision was calculated as the number of true nonmedical use or side effects divided by the number of tweets containing each keywords. Sentiment analysis was conducted using the text and emoji in tweets, and tweets were categorized as very negative (less than -3), negative (-3 to -1), neutral (0), positive (1 to 3), or very positive (more than 3), depending on the sentiment score. RESULTS A total of 4,169 tweets were ultimately selected for analysis. The number of tweets per month was lowest in August (n=264) and highest in May (n=435). There were 292 (7.0%) tweets about nonmedical uses of methylphenidate. Among those, 200 (4.8%) described use for studying, and 15 (0.4%) described use for recreation. In 91 (2.2%) tweets, snorting methylphenidate was mentioned. Side effects of methylphenidate, mainly poor appetite (n=74, 1.8%) and insomnia (n=54, 1.3%), were reported in 316 (7.6%) tweets. The average sentiment score was 0.027 ± 1.475, and neutral tweets were the most abundant (n=1,593, 38.2%). CONCLUSIONS Tweets about methylphenidate were most abundant in May, mentioned nonmedical use for study or recreation, and contained information about side effects. Analysis of Twitter has the advantage of saving the cost and time needed to conduct a survey, and could help identify nonmedical uses and side effects of drugs.


Author(s):  
Keith M. Martin

This chapter discusses cryptographic mechanisms for providing data integrity. We begin by identifying different levels of data integrity that can be provided. We then look in detail at hash functions, explaining the different security properties that they have, as well as presenting several different applications of a hash function. We then look at hash function design and illustrate this by discussing the hash function SHA-3. Next, we discuss message authentication codes (MACs), presenting a basic model and discussing basic properties. We compare two different MAC constructions, CBC-MAC and HMAC. Finally, we consider different ways of using MACs together with encryption. We focus on authenticated encryption modes, and illustrate these by describing Galois Counter mode.


2021 ◽  
Vol 29 (2) ◽  
pp. 229-271
Author(s):  
Panagiotis Grontas ◽  
Aris Pagourtzis ◽  
Alexandros Zacharakis ◽  
Bingsheng Zhang

This work formalizes Publicly Auditable Conditional Blind Signatures (PACBS), a new cryptographic primitive that allows the verifiable issuance of blind signatures, the validity of which is contingent upon a predicate and decided by a designated verifier. In particular, when a user requests the signing of a message, blinded to protect her privacy, the signer embeds data in the signature that makes it valid if and only if a condition holds. A verifier, identified by a private key, can check the signature and learn the value of the predicate. Auditability mechanisms in the form of non-interactive zero-knowledge proofs are provided, so that a cheating signer cannot issue arbitrary signatures and a cheating verifier cannot ignore the embedded condition. The security properties of this new primitive are defined using cryptographic games. A proof-of-concept construction, based on the Okamoto–Schnorr blind signatures infused with a plaintext equivalence test is presented and its security is analyzed.


2020 ◽  
Vol 69 (8/9) ◽  
pp. 717-736
Author(s):  
Małgorzata Kowalska-Chrzanowska ◽  
Przemysław Krysiński

Purpose This paper aims to answer the question of how the Polish representatives of social communication and media sciences communicate the most recent scientific findings in the media space, i.e. what types of publications are shared, what activities do they exemplify (sharing information about their own publications, leading discussions, formulating opinions), what is the form of the scientific communication created by them (publication of reference lists' descriptions, full papers, preprints and post prints) and what is the audience reception (number of downloads, displays, comments). Design/methodology/approach The authors present the results of analysis conducted on the presence of the most recent (2017–2019) publications by the Polish representatives of the widely understood social communication and media sciences in three selected social networking services for scientists: ResearchGate, Google Scholar and Academia.edu. The analyses covered 100 selected representatives of the scientific environment (selected in interval sampling), assigned, according to the OECD classification “Field of Science”, in the “Ludzie nauki” (Men of Science) database to the “media and communication” discipline. Findings The conducted analyses prove a low usage level of the potential of three analysed services for scientists by the Polish representatives of social communication and media sciences. Although 60% of them feature profiles in at least one of the services, the rest are not present there at all. From the total of 113 identified scientists' profiles, as little as 65 feature publications from 2017 to 2019. Small number of alternative metrics established in them, implies, in turn, that if these metrics were to play an important role in evaluation of the value and influence of scientific publications, then this evaluation for the researched Polish representatives of social communication and media sciences would be unfavourable. Originality/value The small presence of the Polish representatives of the communication and media sciences in three analysed services shows that these services may be – for the time being – only support the processes of managing own scientific output. Maybe this quite a pessimistic image of scientists' activities in the analysed services is conditioned by a simple lack of the need to be present in electronic channels of scientific communication or the lack of trust to the analysed services, which, in turn, should be linked to their shortcomings and flaws. However, unequivocal confirmation of these hypotheses might be brought by explorations covering a larger group of scientists, and complemented with survey studies. Thus, this research may constitute merely a starting point for further explorations, including elaboration of good practices with respect to usage of social media by scientists.


Information ◽  
2021 ◽  
Vol 12 (2) ◽  
pp. 65
Author(s):  
Yuta Nemoto ◽  
Vitaly Klyuev

While users benefit greatly from the latest communication technology, with popular platforms such as social networking services including Facebook or search engines such as Google, scientists warn of the effects of a filter bubble at this time. A solution to escape from filtered information is urgently needed. We implement an approach based on the mechanism of a metasearch engine to present less-filtered information to users. We develop a practical application named MosaicSearch to select search results from diversified categories of sources collected from multiple search engines. To determine the power of MosaicSearch, we conduct an evaluation to assess retrieval quality. According to the results, MosaicSearch is more intelligent compared to other general-purpose search engines: it generates a smaller number of links while providing users with almost the same amount of objective information. Our approach contributes to transparent information retrieval. This application helps users play a main role in choosing the information they consume.


Sign in / Sign up

Export Citation Format

Share Document