Match!
Colin Boyd
Norwegian University of Science and Technology
287Publications
38H-index
8,893Citations
Publications 298
Newest
#1Colin Boyd (NTNU: Norwegian University of Science and Technology)H-Index: 38
#2Anish Mathuria (Dhirubhai Ambani Institute of Information and Communication Technology)H-Index: 9
Last.Douglas Stebila (UW: University of Waterloo)H-Index: 20
view all 3 authors...
Identity-based public key cryptography was first proposed by Shamir in 1984 [665]. The idea is to avoid the need for public key certificates by making the public key publicly computable from the identification information of the owner. The identification information can include any desired fields such as real name, physical description or identification numbers. Identity-based cryptography avoids the difficulty of having to distribute public keys and thus avoids the need for a public key infrast...
Source
#1Colin Boyd (NTNU: Norwegian University of Science and Technology)H-Index: 38
#2Anish Mathuria (Dhirubhai Ambani Institute of Information and Communication Technology)H-Index: 9
Last.Douglas Stebila (UW: University of Waterloo)H-Index: 20
view all 3 authors...
Authenticated key exchange protocols are at the core of Internet security protocols: they authenticate one or more of the parties communicating, and provide the establishment of a session key that is then used to encrypt application data. There are several protocols in widespread use to secure various applications. The most prominent are the following:
Source
#1Colin Boyd (NTNU: Norwegian University of Science and Technology)H-Index: 38
#2Anish Mathuria (Dhirubhai Ambani Institute of Information and Communication Technology)H-Index: 9
Last.Douglas Stebila (UW: University of Waterloo)H-Index: 20
view all 3 authors...
During the early years of open academic research in cryptography it was commonplace to see research papers following a sequence of break, fix, break, fix … : a scheme would be proposed and then others would analyse it, often finding an attack. The scheme was then patched up and subjected to further scrutiny, and so the cycle would continue. Although this pattern applied to many different kinds of cryptographic schemes, it was nowhere more true than for protocols for authentication and key exchan...
Source
#1Colin Boyd (NTNU: Norwegian University of Science and Technology)H-Index: 38
#2Anish Mathuria (Dhirubhai Ambani Institute of Information and Communication Technology)H-Index: 9
Last.Douglas Stebila (UW: University of Waterloo)H-Index: 20
view all 3 authors...
As electronic communications and information services become more sophisticated, many applications involving multiple entities become necessary. Since these applications will generally require secure communications it is necessary to design protocols that establish keys for groups of principals. There is a great variety of different practical requirements that may be appropriate in different applications, and the number of protocols is very large. In this chapter we will mainly restrict attentio...
Source
#1Colin Boyd (NTNU: Norwegian University of Science and Technology)H-Index: 38
#2Anish Mathuria (Dhirubhai Ambani Institute of Information and Communication Technology)H-Index: 9
Last.Douglas Stebila (UW: University of Waterloo)H-Index: 20
view all 3 authors...
Authentication and key establishment are fundamental steps in setting up secure communications. Authentication is concerned with knowing that the correct parties are communicating; key establishment is concerned with obtaining good cryptographic keys to protect the communications, particularly to provide confidentiality and integrity of the data communicated. Because the modern world increasingly relies on digital networks, the security of communications is a critical element in the functioning ...
Source
#1Colin Boyd (NTNU: Norwegian University of Science and Technology)H-Index: 38
#2Kristian Gjøsteen (NTNU: Norwegian University of Science and Technology)H-Index: 10
Last.Thomas Haines (NTNU: Norwegian University of Science and Technology)H-Index: 2
view all 4 authors...
A Blind Coupon Mechanism (BCM) allows spreading of alerts quietly and quickly over unreliable networks. The BCM primitive ensures that alerts are efficiently broadcast while the nature of these signals are securely hidden. However, current BCM proposals are limited to indicating a single bit of information and also lack natural privacy properties. In this paper, we develop a new BCM solution that allows the transmission of several alerts privately and in one shot. This extension perfectly suits ...
Source
#1Enio Marku (NTNU: Norwegian University of Science and Technology)
#2Gergely Biczók (BME: Budapest University of Technology and Economics)H-Index: 11
Last.Colin Boyd (NTNU: Norwegian University of Science and Technology)H-Index: 38
view all 3 authors...
Value-added 5G verticals are foreseen to be delivered as a service chain over multiple network operators with extensive outsourcing of Virtual Network Functions (VNFs). In this short paper we introduce the initial design of SafeLib, a software middlebox platform based on Intel SGX, which protects user traffic, VNF code, policy input and state in such scenarios, while also retaining high performance. Augmenting the smart integration of existing hardware and software building blocks with new secur...
Source
#1Colin BoydH-Index: 38
#2Gareth T. DaviesH-Index: 3
Last.Yao JiangH-Index: 1
view all 4 authors...
#1Colin Boyd (NTNU: Norwegian University of Science and Technology)H-Index: 38
#2Gareth T. Davies (NTNU: Norwegian University of Science and Technology)H-Index: 3
Last.Mohsen Toorani (University of Bergen)H-Index: 12
view all 5 authors...
Cloud storage is in widespread use by individuals and enterprises but introduces a wide array of attack vectors. A basic step for users is to encrypt their data, yet it is not obvious what security properties are required for such encryption. Furthermore, cloud storage providers often use techniques such as data deduplication for improving efficiency which restricts the application of semantically-secure encryption. Generic security goals and attack models have thus far proved elusive: primitive...
Source
12345678910