Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 5 of 5
  • Item
    Cryptanalysis of a remote user authentication protocol using smart cards
    (IEEE Computer Society help@computer.org, 2014) Madhusudhan, R.; Kumar, R.S.
    Remote user authentication using smart cards is a method of verifying the legitimacy of remote users accessing the server through insecure channel, by using smart cards to increase the efficiency of the system. During last couple of years many protocols to authenticate remote users using smart cards have been proposed. But unfortunately, most of them are proved to be unsecure against various attacks. Recently this year, Yung-Cheng Lee improved Shin et al.'s protocol and claimed that their protocol is more secure. In this article, we have shown that Yung-Cheng-Lee's protocol too has defects. It does not provide user anonymity; it is vulnerable to Denial-of-Service attack, Session key reveal, user impersonation attack, Server impersonation attack and insider attacks. Further it is not efficient in password change phase since it requires communication with server and uses verification table. © 2014 IEEE.
  • Item
    Cryptanalysis of remote user authentication scheme with key agreement
    (Institute of Electrical and Electronics Engineers Inc., 2015) Madhusudan, R.; Valiveti, A.
    Password authentication with smart card is one of the most convenient and effective two-factor authentication mechanisms for remote systems to assure one communicating party of the legitimacy of the corresponding party by acquisition of corroborative evidence. This technique has been widely deployed for various kinds of authentication applications, such as remote host login, online banking, e-commerce and e-health. Recently, Kumari et al. presented a dynamic-identity-based user authentication scheme with session key agreement. In this research, we illustrate that Kumari et al.'s scheme violates the purpose of dynamic-identity contrary to author's claim. We show that once the smart card of an arbitrary user is lost, messages of all registered users are at risk. Using information from an arbitrary smart card, an adversary can impersonate any user of the system. © 2015 IEEE.
  • Item
    Optimized Lattice-Based Homomorphic Encryption for Secure Multiparty Computation in Group Communication
    (Institute of Electrical and Electronics Engineers Inc., 2024) Renisha, P.S.; Rudra, B.
    This research work describes a framework for secured and effective way of group interaction incorporating classical cryptography and quantum communication technique. This framework employs a classical cryptographic methods for group logistics like as transmitting of messages and membership management while employing quantum communication strategy for secure key distribution and related authentication. In order to increase the flexibility and datasecurity of the proposed system further, a supervisor learning based mechanism is incorporated into the framework where reinforcement learning will employed in controlling the interaction of the protocols and the decision-making processes in an active manner. This combination of classical, quantum and supervisor learning strategies gives a solution to the issues of scalability, efficiency, effective and timely actionable response to increasing cyber threats especially in the era of quantum computing. The framework is highly effective and secured for group interaction in distributed network infrastructures. It will be a leading the approach for advanced cryptographic mechanism in the future. © 2024 IEEE.
  • Item
    Hybrid Voting System Using Blockchain
    (Institute of Electrical and Electronics Engineers Inc., 2024) Nikhare, R.V.
    Voting is a vital pillar of democracy, upholding the principles of representation and public expression. Over time, the quest for secure and efficient systems has driven the transition from paper ballots to Electronic Voting Machines (EVMs). Nonetheless, persistent concerns surrounding EVM security have spurred the exploration of blockchain-based voting systems. The inherent attributes of transparency and immutability offered by blockchain technology hold promise in augmenting the security and integrity of the voting process. However, blockchain-based voting systems encounter their own distinct challenges. This paper presents a pioneering hybrid voting system model that harmonizes the merits of existing systems with the potential of blockchain technology. In this hybrid model, the authentication of voters is collaboratively facilitated by government employees and blockchain technology. Subsequently, voters can securely register their votes within the blockchain. Striving to strike a delicate equilibrium between convenience and security, this model aims to engender a resilient and all-encompassing voting system that inspires trust. A comprehensive assessment of the strengths and limitations inherent in traditional voting systems is undertaken, while simultaneously exploring the vast potential of blockchain technology. By effectively addressing the concerns pertaining to security and integrity, the proposed hybrid model aspires to forge a path toward a voting system that is both resilient and unequivocally trusted. ©2024 IEEE.
  • Item
    A Hybrid Framework for Secure Group Communication Using Quantum-Classical Cryptography and Reinforcement Learning
    (Institute of Electrical and Electronics Engineers Inc., 2025) Renisha, P.S.; Rudra, B.
    This research work describes a framework for secured and effective way of group interaction incorporating classical cryptography and quantum communication technique. This framework employs a classical cryptographic methods for group logistics like as transmitting of messages and membership management while employing quantum communication strategy for secure key distribution and related authentication. In order to increase the flexibility and data-security of the proposed system further, a supervisor learning based mechanism is incorporated into the framework where reinforcement learning will employed in controlling the interaction of the protocols and the decision-making processes in an active manner. This combination of classical, quantum and supervisor learning strategies gives a solution to the issues of scalability, efficiency, effective and timely actionable response to increasing cyber threats especially in the era of quantum computing. The framework is highly effective and secured for group interaction in distributed network infrastructures. It will be a leading the approach for advanced cryptographic mechanism in the future. © 2025 IEEE.