Uzunkol, O. (2019). Comments on “verifiable outsourced attribute-based signature scheme”. Multimedia Tools and Applications , 78(9), 11735–11742,. http://doi.org/10.1007/s11042-018-6725-7
Abstract
Ren and Jiang recently published a “verifiable outsourced attribute-based signature scheme” in Multimedia Tools and Applications. In this note, we first provide two attacks on the verifiability of the semi-signatures of this scheme by showing that a malicious signing-cloud service provider (S-CSP) can always cheat the signer unlike the authors’ claim. Moreover, one of these attacks also implies that an untrusted S-CSP can always forge signatures contrary to the claimed unforgeability against chosen message attacks. Therefore, this scheme unfortunately does not satisfy the main security properties for a delegated signature scheme.
Moritz, S., & Uzunkol, O. (2019). Secure delegation of group exponentiations: Efficient and fully verifiable schemes with two servers. Security and Privacy, n/a, e70. http://doi.org/https://doi.org/10.1002/spy2.70 (Original work published 2019)
Abstract
Abstract Recent interactions between cloud service providers and mobile resource-constrained devices have increased the interest on the delegation of expensive computations to powerful external server providers. At the same time, security and verifiability of the delegated computation are challenging though highly demanded requirements for various application scenarios. Many security solutions using advanced cryptographic technologies require a large number of highly expensive group exponentiations (GEs). In this paper, we address the problems regarding secure and verifiable delegation of GEs. We first analyze two delegation schemes for GEs both introduced recently in Cluster Computing by Fu et al with the claim that they both provide full verifiability. Particularly, we show that the first scheme is only verifiable with a probability at most 2/3, and the second scheme is totally unverifiable. Then, we propose a secure, efficient and fully verifiable delegation scheme InvDel for a GE using two servers, where one of which is malicious. With InvDel the delegator does not require computations of any group inversions (GIs) while providing full verifiability. Then, we extend InvDel to SimInvDel which is the first, efficient and secure delegation scheme for n-simultaneous GEs achieving full verifiability for n > 1. Secondly, we give implementation results of InvDel and SimInvDel using an Android application together with a comprehensive efficiency analysis of computation and communication with the previous schemes. For instance, when the required CPU costs for a single GE are compared with a 4092-bit modulus, InvDel is more than 220-times (resp. more than two times) more efficient than the local computation (resp. using a previous fully verifiable scheme proposed in the literature). Finally, we also utilize InvDel and SimInvDel to speed-up the verification of Schnorr s signature and Cramer-Shoup encryption schemes.
Jauch, C., Alhrshy, L., & Kloft, P. (2019). Flexible hydropneumatische Kolbenspeicher aus kohlefaserverstärktem Kunststoff zum Einsatz in Rotorblätter von Windenergieanlagen. Ingenieurspiegel , 4, 3. (Original work published November 2019)
Wittkowsky, M. (2019). Lingua controllata e traduzione (automatica) nella comunicazione tecnica. In MACHINE TRANSLATION - COME USARLA IN MODO PROFESSIONALE (S. 8). Aracne editrice. http://doi.org/10.4399/97888255287495 (Original work published November 2019)
Gloe, A., Jauch, C., & Räther, T. (2019). Störfall im Flensburger Stromnetz – wie Windenergieanlagen den Blackout möglicherweise hätten verhindern können. Ingenieurspiegel , 4, 3. (Original work published November 2019)
Jauch, C., Rohr, A., Gloe, A., Thiemke, M., & Wilhelm, J. E. (2019). Ein Windenergieanlagenemulator zum Test von Leistungseinspeisung im Netz. Ingenieurspiegel , 4, 4. (Original work published November 2019)
Jiawei, H., Löhlein, B., & Huth, G. (2019). Numerical and Analytical Investigation of Rotor Eddy Current Losses for a Super High Speed Permanent Magnet Synchronous Motor. In IKMT 2019 - Innovative small Drives and Micro-Motor Systems (S. 1–8). Abgerufen von https://ieeexplore.ieee.org/document/8892431
Teistler, M., Reinhold, S., Süncksen, M., & Frohnoff, U. (2019). Simulationsbasiertes Lernspiel in der Ultraschallausbildung am Beispiel der Anästhesiologie. In Ultraschall Med, European Journal of Ultrasound (Bd. 40). Leipzig, Germany: Thieme. http://doi.org/10.1055/s-0039-1695967 (Original work published August 2019)
Suchodolski, K., von Dincklage, F., Lichtner, G., Friesdorf, W., Podtschaske, B., & Ragaller, M. (2019). Vergleich aktueller Patientendatenmanagementsysteme in der Intensivmedizin aus Sicht der klinischen Nutzer. Der Anaesthesist, 68(7), 436–443,. http://doi.org/10.1007/s00101-019-0615-x (Original work published Juli 2019)
Abstract
Patientendatenmangementsysteme (PDMS) sind computerbasierte Systeme zur Verarbeitung von medizinischen Daten, die auf Intensivstationen sowohl positive als auch negative Einflüsse auf die Patientenversorgung haben können. Die Faktoren, die darüber entscheiden, ob ein PDMS eher Vor- oder Nachteile bringt und wie deutlich diese ausfallen, werden unter dem Begriff „Gebrauchstauglichkeit“ zusammengefasst. Diese Arbeit fasst die Ergebnisse aus 3 bereits publizierten Arbeiten zu diesem Thema zusammen.