Enhancing Efficiency in Trustless Cryptography: An Optimized SM9-Based Distributed Key Generation Scheme DOI Creative Commons
Jinhong Chen, Xueguang Zhou, Wei Fu

и другие.

Sensors, Год журнала: 2024, Номер 24(24), С. 7874 - 7874

Опубликована: Дек. 10, 2024

Intelligent systems are those in which behavior is determined by environmental inputs, and actions taken to maximize the probability of achieving specific goals. widely applied across various fields, particularly distributed intelligent systems. At same time, due extensive interaction with user data, face significant challenges regarding security. This study proposes an optimized key generation (DKG) scheme for identity-based cryptography (IBC) using SM9 standard. Our introduces a (t, n)-threshold system that functions without trusted center, addressing vulnerability single points failure conventional centers (KGCs). We reduce communication computational demands refining Paillier share transformation protocol, ensuring efficient, centerless operations. The scheme’s security, validated existential unforgeability against adaptive chosen identity attacks (EUF-CIA) model, demonstrates its practical applicability enhanced security

Язык: Английский

Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them DOI Creative Commons
Abdullah Alabdulatif, Navod Neranjan Thilakarathne

Computers, Год журнала: 2025, Номер 14(1), С. 24 - 24

Опубликована: Янв. 15, 2025

In recent years, cyberattacks have increased in sophistication, using a variety of tools to exploit vulnerabilities across the global digital landscapes. Among most commonly used at an attacker’s disposal are Google dorks, Shodan, and Censys, which offer unprecedented access exposed systems, devices, sensitive data on World Wide Web. While these can be leveraged by professional hackers, they also empowered “Script Kiddies”, who low-skill, inexperienced attackers use readily available exploits scanning without deep technical knowledge. Consequently, targeting critical infrastructure growing rapid rate, driven ease with solutions operated minimal expertise. This paper explores potential for enabled tools, presenting cases where platforms been both offensive defensive purposes. By examining notable incidents analyzing threats, we outline proactive measures protect against emerging risks. this study, delve into how offensively serve functions within cybersecurity. Additionally, introduce automated all-in-one tool designed consolidate functionalities offering streamlined solution vulnerability detection analysis. Lastly, propose defense strategies mitigate exploitation risks associated such aiming enhance resilience evolving cyber threats.

Язык: Английский

Процитировано

0

Enhancing Efficiency in Trustless Cryptography: An Optimized SM9-Based Distributed Key Generation Scheme DOI Creative Commons
Jinhong Chen, Xueguang Zhou, Wei Fu

и другие.

Sensors, Год журнала: 2024, Номер 24(24), С. 7874 - 7874

Опубликована: Дек. 10, 2024

Intelligent systems are those in which behavior is determined by environmental inputs, and actions taken to maximize the probability of achieving specific goals. widely applied across various fields, particularly distributed intelligent systems. At same time, due extensive interaction with user data, face significant challenges regarding security. This study proposes an optimized key generation (DKG) scheme for identity-based cryptography (IBC) using SM9 standard. Our introduces a (t, n)-threshold system that functions without trusted center, addressing vulnerability single points failure conventional centers (KGCs). We reduce communication computational demands refining Paillier share transformation protocol, ensuring efficient, centerless operations. The scheme’s security, validated existential unforgeability against adaptive chosen identity attacks (EUF-CIA) model, demonstrates its practical applicability enhanced security

Язык: Английский

Процитировано

0