Browsing by Author "Kiraz, Mehmet Sabir"
Now showing items 1-12 of 12
-
Anonymous RFID authentication for cloud services
Cloud computing is one of the fastest growing segments of IT industry since the users’ commitments for investment and operations are minimized, and costs are in direct relation to usage and demand. In general, cloud ... -
CertLedger: A New PKI Model with Certi cate Transparency Based on Blockchain
Kubilay, Murat; Mantar, Haci Ali; Kiraz, Mehmet Sabir (Article)In conventional PKI, CAs are assumed to be fully trusted. However, in practice, CAs' absolute responsibility for providing trustworthiness caused major security and privacy issues. To prevent such issues, Google introduced ... -
A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
Kiraz, Mehmet Sabir (Article)The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic benefits, because it assures the reduction in ... -
An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates
Bingol, M.A.; Bicer, O.; Kiraz, Mehmet Sabir; Levi, A. (Article)Private function evaluation (PFE) is a special case of secure multi-party computation (MPC), where the function to be computed is known by only one party. PFE is useful in several real-life applications where an algorithm ... -
Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations
Kiraz, Mehmet Sabir; Uzunkol, Osmanbey (Article)Reducing computational cost of cryptographic computations for resource-constrained devices is an active research area. One of the practical solutions is to securely outsource the computations to an external and more powerful ... -
k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions
Celik, Serkan; Kiraz, Mehmet Sabir; Levi, Albert; Bingol, M.A.; Demirci, H.; Kardas, S. (Article)This paper examines Vaudenay’s privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary ... -
KORGAN: An Efficient PKI Architecture Based on PBFT Through Dynamic Threshold Signatures
Kiraz, Mehmet Sabir; Kubilay, Murat; Mantar, Haci Ali (Article)During the last decade, several misbehaving Certificate Authorities (CA) have issued fraudulent TLS certificates allowing MITM kinds of attacks which result in serious security incidents. In order to avoid such incidents, ... -
Norwegian internet voting protocol revisited: ballot box and receipt generator are allowed to collude
Norway experienced internet voting in 2011 and 2013 for municipal and parliamentary elections, respectively. Its security depends on the assumptions that the involving organizations are completely independent, reliable, ... -
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Bingol, Muhammed Ali; Kardas, Suleyman; Kiraz, Mehmet Sabir; Demirci, Huseyin (Conference)Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purposes. Distance bounding protocols are particularly designed ... -
Security and Efficiency Analysis of the Hamming Distance Computation Protocol Based on Oblivious Transfer
Kiraz, Mehmet Sabir; Genc, Ziya Alper; Kardas, Suleyman (Article)Bringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses Oblivious Transfer and provides security in the semi-honest model. The other scheme uses Committed Oblivious ... -
Still Wrong Use of Pairings in Cryptography
Kiraz, Mehmet Sabir; Uzunkol, Osmanbey (Article)Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health ... -
THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system
Karabat, Cagatay; Kiraz, Mehmet Sabir; Erdogan, Hakan; Savas, Erkay (Article)In this paper, we introduce a new biometric verification and template protection system which we call THRIVE. The system includes novel enrollment and authentication protocols based on threshold homomorphic encryption where ...