Papers by Amit K. Awasthi

In the cloud computing application area of accomplish, we find the fact that cloud computing cove... more In the cloud computing application area of accomplish, we find the fact that cloud computing covers a lot of areas are its main asset. At a top level, it is an approach to IT where many users, some even from different companies get access to shared IT resources such as servers, routers and various file extensions, instead of each having their own dedicated servers. This offers many advantages like lower costs and higher efficiency. Unfortunately there have been some high profile incidents where some of the largest cloud providers have had outages and even lost data, and this underscores that it is important to have backup, security and disaster recovery capabilities. In education field, it gives better choice and flexibility to IT departments than others. The platform and applications you use can be onpremises, off-premises, or a combination of both, depending on your academic organization's needs. With cloud computing in education, you get powerful software and massive computing resources where and when you need them. Use cloud services to best combine: *On-demand computing and storage. *A familiar development experience with ondemand scalability. *Online services for anywhere, anytime access to powerful web-based tools.

Journal of Mathematical Cryptology, 2017
We introduce a new cryptographic primitive identity-based anonymous proxy signcryption which prov... more We introduce a new cryptographic primitive identity-based anonymous proxy signcryption which provides anonymity to the proxy sender while also providing a mechanism to the original sender to expose the identity of the proxy sender in case of misuse. We introduce a formal definition of an identity-based anonymous proxy signcryption (IBAPS) scheme and give a security model for it. We also construct an IBAPS scheme and prove its security under the discrete logarithm assumption and computational Diffie–Hellman assumption. Moreover, we do an efficiency comparison with the existing identity-based signcryption schemes and anonymous signcryption schemes and show that our scheme is much more efficient than those schemes, we also compare the efficiency of our scheme with the available proxy signcryption schemes and show that our scheme provides anonymity to the proxy sender at cost less than those of existing proxy signcryption schemes.
A Scheme for obtaining a Warrant Message from the delegated Digital Proxy Signatures
CiteSeerX - Document Details (Isaac Councill, Lee Giles): Mambo et al [6-7] introduced a proxy si... more CiteSeerX - Document Details (Isaac Councill, Lee Giles): Mambo et al [6-7] introduced a proxy signature scheme. Neuman [8] extended the scheme for delegation by warrant, which was further extended by Kim et al [4] to partial delegation with a warrant. In this paper we propose ...
A New Multi-Proxy Signature Scheme for Partial Delegation with Warrant
eCryp ePrint Archive, Report
Page 1. A New Multi-Proxy Signature Scheme for Partial Delegation with Warrant Sunder Lal1 and Am... more Page 1. A New Multi-Proxy Signature Scheme for Partial Delegation with Warrant Sunder Lal1 and Amit K Awasthi Department of Mathematics, IBS, Khandari, Agra 282002(UP) INDIA Department of Applied Science, Hindustan ...
Cryptology e-Print Archive, Report 2003, 2003
Mambo et al [6-7] introduced a proxy signature scheme. Neuman [8] extended the scheme for delegat... more Mambo et al [6-7] introduced a proxy signature scheme. Neuman [8] extended the scheme for delegation by warrant, which was further extended by Kim et al [4] to partial delegation with a warrant. In this paper we propose a new type of digital proxy signature scheme in which the warrant message can be recovered from the proxy signature. In this scheme the warrant message is conveyed within the proxy signature and recovered by the verifier, i.e., the warrant need not be hashed or sent along with the proxy signature. It saves both communication bandwidth and storage space.
A new proxy ring signature scheme
Arxiv preprint cs/0410010, 2004
Proxy Blind Signature Scheme
Journal of Information Science and Engineering. …, 2003
Abstract: Blind signature is the concept to ensure anonymity of e-coins. Untracebility and unlink... more Abstract: Blind signature is the concept to ensure anonymity of e-coins. Untracebility and unlinkability are two main properties of real coins, which require mimicking electronically. Whenever a user is permitted to spend an e-coin, he is in need to fulfill above requirements of blind ...
IEICE Transactions on Information and Systems, 2013
Recently, Shao et al. [M. Shao and Y. Chin, A privacypreserving dynamic id-based remote user auth... more Recently, Shao et al. [M. Shao and Y. Chin, A privacypreserving dynamic id-based remote user authentication scheme with access control for multi-server environment, IEICE Transactions on Information and Systems, vol.E95-D, no.1, pp.161-168, 2012] proposed a dynamic ID-based remote user authentication scheme with access control for multiserver environments. They claimed that their scheme could withstand various attacks and provide anonymity. However, in this letter, we will point out that Shao et al.'s scheme has practical pitfalls and is not feasible for real-life implementation. We identify that their scheme is vulnerable to two kinds of attacks and cannot provide anonymity.
Int. J. Netw. Secur., 2005
In 2003, Novikov and Kislev proposed a scheme for an authentication of the user from the remote a... more In 2003, Novikov and Kislev proposed a scheme for an authentication of the user from the remote autonomous object. Recently Yang et al. pointed out an evidence of man-in-middle attack. In this paper we show another evidence of man-in-middle-attack. We also pointed out that reflection attack can also be framed successfully on the scheme.
On the basis of Vaudenay’s untraceability model, this paper describes cryptanalyses of recently p... more On the basis of Vaudenay’s untraceability model, this paper describes cryptanalyses of recently proposed Zhuang et al.’s ultralightweight RFID authentication protocol for low cost tags RAP and Dehkordi and Farzaneh’s improved hash based RFID mutual authentication protocol. This paper formally demonstrates that RAP is insecure and does not attain even Narrow Forward privacy level of security. Additionally, RAP protocol is traceable and suffers from impersonation attack. Also Dehkordi and Farzaneh’s proposed protocol is impractical formally as it does not attain even Narrow Forward privacy level of security.
Malaya Journal of Matematik, 2018
This research paper focuses on structuring an RFID Protocol in which the answer to the question "... more This research paper focuses on structuring an RFID Protocol in which the answer to the question "Am I really the person who is accessing the resources" will be solved by implementing biometric techniques with RFID Protocol. Therefore, an effort will make to construct RFID protocol using biometric impression of RFID tag holder for resisting the protocol against illegitimate access.

arXiv (Cornell University), Apr 23, 2005
In 2001, Rivest et al. firstly introduced the concept of ring signatures. A ring signature is a s... more In 2001, Rivest et al. firstly introduced the concept of ring signatures. A ring signature is a simplified group signature without any manager. It protects the anonymity of a signer. The first scheme proposed by Rivest et al. was based on RSA cryptosystem and certificate based public key setting. The first ring signature scheme based on DLP was proposed by Abe, Ohkubo, and Suzuki. Their scheme is also based on the general certificate-based public key setting too. In 2002, Zhang and Kim proposed a new ID-based ring signature scheme using pairings. Later Lin and Wu proposed a more efficient ID-based ring signature scheme. Both these schemes have some inconsistency in computational aspect. In this paper we propose a new ID-based ring signature scheme and a proxy ring signature scheme. Both the schemes are more efficient than existing one. These schemes also take care of the inconsistencies in above two schemes.

A Key Agreement Algorithm Based on ECDSA for Wireless Sensor Network
Smart Innovation, Systems and Technologies, 2015
Today the wireless sensor networks are being used extensively for general purposes and military a... more Today the wireless sensor networks are being used extensively for general purposes and military aviation that results into the fulfillment of the security requirements. These networks are easily susceptible to attack. Many researchers provided security by using symmetric key cryptography but advanced research shows public key cryptography algorithms can also be used in WSN. Major studies and researches in literature nowadays stress on RSA and ECC algorithms but RSA consumes more energy than ECC. We propose a protocol to provide secure data delivery between node and gateway. Our protocol is based on ECDSA and the proposed scheme imposes very light computational and communication overhead with reducing the measure of key storage. Analysis depicts that the scheme has few merits in connectivity of key, consumption of energy and communication.

Remote user authentication is a mechanism in which the remote server verifies the legitimacy of a... more Remote user authentication is a mechanism in which the remote server verifies the legitimacy of a user over an insecure communication channel. Password based authentication schemes have been widely deployed to verify the legitimacy of remote users as password authentication is one of the simplest and the most convenient authentication mechanism over insecure networks. In remote user authentication scheme, the user is assigned a smart card, which is being personalized by some parameters and provide the legal users to use the resources of the remote system. Until now, there have been ample of remote user authentication schemes published in the literature and each published schemes have its own merits and demerits. Recently, many schemes proposed are based on the one-way hash function. The computational complexity of their schemes is superior to the discrete logarithm-problem-based schemes. In our paper, we have defined all the security requirements and the goals. An ideal password authentication schemes should satisfy and achieve all of these. We have presented the results of our survey through five of the currently available secure one way hash function based remote user authentication schemes. We hope an ideal smart card (not storing (IDi, P Wi), which meets all the security requirements and achieves all the goals can be developed.
In 2010, Sood et al [16] proposed a secure dynamic identity based authentication scheme using sma... more In 2010, Sood et al [16] proposed a secure dynamic identity based authentication scheme using smart cards. They claimed that their scheme is secure against various attacks. In this paper, we demonstrate that their scheme is completely insecure and vulnerable to outsider attack as well as insider attack. An outsider attacker can obtain the common session key between the user and the server, while an insider attacker can get not only the session key but also the secret key of the server. Therefore, the entire system collapses. To remedy these security flaws, an improved scheme is proposed to withstand these attacks.
An improved remote user authentication scheme with key agreement
Computers & Electrical Engineering, 2014
An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings.Amit K Awa... more An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings.Amit K Awasthi. ... Recently, Giri and Srivastava [16] observed that the improved scheme is still insecure to off-line attack and they suggested an improvement on Feng et al's scheme. ...
Quality, Reliability, Security and Robustness in Heterogeneous Networks
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2013
This book constitutes the thoroughly refereed post-conference proceedings of the 9th Internationa... more This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2013, which was held in National Capital Region (NCR) of India during January 2013. The 87 revised full papers were carefully selected from 169 submissions and present the recent technological developments in broadband high-speed networks, peer-to-peer networks, and wireless and mobile networks.
A hash based mutual RFID tag authentication protocol in telecare medicine information system
Journal of medical systems, 2015
Radio Frequency Identification (RFID) is a technology which has multidimensional applications to ... more Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.
RFID Authentication Protocol to Enhance Patient Medication Safety
Journal of Medical Systems, 2013
Medication errors can cause substantial harm to patients. Automated patient medication system wit... more Medication errors can cause substantial harm to patients. Automated patient medication system with RFID technology is purposely used to reduce the medication error, to improve the patient safety, to provide personalized patient medication and identification and also to provide counterfeit protection to the patients. In order to enhance medication safety for patients we propose a new dynamic ID based lightweight RFID authentication protocol. Due to low storage capacity and limited computational and communicational capacity of tags, only pseudo random number generator function, one way hash function and bitwise Xor operation are used in our authentication protocol. The proposed protocol is practical, secure and efficient for health care domain.
Remarks on the security of the strong proxy signature scheme with proxy signer privacy protection
International Journal of Information and Computer Security, 2010
In 1996, Mambo et al. introduced the proxy signature scheme for digital applications to delegate ... more In 1996, Mambo et al. introduced the proxy signature scheme for digital applications to delegate the signing capability to a proxy signer. Various constructions were made to devise a strong nondesignated proxy signature scheme. In 2002, Shum and Wei proposed an ...
Uploads
Papers by Amit K. Awasthi