Innovative Batch Cryptographic Method to Detect Fake Signatures in Adversarial Networks π
Explore a cutting-edge cryptographic approach to identify invalid signatures in adversarial networks, enhancing secure access in wireless mobile systems.

SOWMIYA SRINIVASAN
99 views β’ Apr 11, 2017

About this video
BATCH CRYPTOGRAPHIC TECHNIQUE TO DISCOVER INVALID SIGNATURES IN ADVERSARIAL NETWORK
Secure access is one of the fundamental problems in wireless mobile networks. Digital signature is a widely used technique to protect messagesβ authenticity and nodesβ identities.
From the practical perspective, to ensure the quality of services in wireless mobile networks, ideally the process of signature verification should introduce minimum delay.
Batch cryptography technique is a powerful tool to reduce verification time.
However, most of the existing works focus on designing batch verification algorithms for wireless mobile networks without sufficiently considering the impact of invalid signatures, which can lead to verification failures and performance degradation.
In this project, we propose a Batch Identification Game Model (BIGM) in wireless mobile networks, enabling nodes to find invalid signatures with reasonable delay no matter whether the game scenario is complete information or incomplete information.
Specifically, we analyze and prove the existence of Nash Equilibriums (NEs) in both scenarios, to select the dominant algorithm for identifying invalid signatures.
To optimize the identification algorithm selection, we propose a self-adaptive auto-match protocol which estimates the strategies and states of attackers based on historical information. It identification delay are provided to demonstrate that BIGM can identify invalid signatures more efficiently than existing algorithms.
Also share
https://youtu.be/6unrD71rdz0
Secure access is one of the fundamental problems in wireless mobile networks. Digital signature is a widely used technique to protect messagesβ authenticity and nodesβ identities.
From the practical perspective, to ensure the quality of services in wireless mobile networks, ideally the process of signature verification should introduce minimum delay.
Batch cryptography technique is a powerful tool to reduce verification time.
However, most of the existing works focus on designing batch verification algorithms for wireless mobile networks without sufficiently considering the impact of invalid signatures, which can lead to verification failures and performance degradation.
In this project, we propose a Batch Identification Game Model (BIGM) in wireless mobile networks, enabling nodes to find invalid signatures with reasonable delay no matter whether the game scenario is complete information or incomplete information.
Specifically, we analyze and prove the existence of Nash Equilibriums (NEs) in both scenarios, to select the dominant algorithm for identifying invalid signatures.
To optimize the identification algorithm selection, we propose a self-adaptive auto-match protocol which estimates the strategies and states of attackers based on historical information. It identification delay are provided to demonstrate that BIGM can identify invalid signatures more efficiently than existing algorithms.
Also share
https://youtu.be/6unrD71rdz0
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
99
Likes
2
Duration
10:19
Published
Apr 11, 2017
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now