Browsing by Author "Kiraz, Mehmet Sabir"
Now showing items 1-8 of 8
-
CertLedger: A New PKI Model with Certi cate Transparency Based on Blockchain
Kubilay, Murat; Mantar, Haci Ali; Kiraz, Mehmet Sabir (Article)In conventional PKI, CAs are assumed to be fully trusted. However, in practice, CAs' absolute responsibility for providing trustworthiness caused major security and privacy issues. To prevent such issues, Google introduced ... -
A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
Kiraz, Mehmet Sabir (Article)The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic benefits, because it assures the reduction in ... -
An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates
Bingol, M.A.; Bicer, O.; Kiraz, Mehmet Sabir; Levi, A. (Article)Private function evaluation (PFE) is a special case of secure multi-party computation (MPC), where the function to be computed is known by only one party. PFE is useful in several real-life applications where an algorithm ... -
Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations
Kiraz, Mehmet Sabir; Uzunkol, Osmanbey (Article)Reducing computational cost of cryptographic computations for resource-constrained devices is an active research area. One of the practical solutions is to securely outsource the computations to an external and more powerful ... -
k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions
Celik, Serkan; Kiraz, Mehmet Sabir; Levi, Albert; Bingol, M.A.; Demirci, H.; Kardas, S. (Article)This paper examines Vaudenay’s privacy model, which is one of the first and most complete privacy models that featured the notion of different privacy classes. We enhance this model by introducing two new generic adversary ... -
Security and Efficiency Analysis of the Hamming Distance Computation Protocol Based on Oblivious Transfer
Kiraz, Mehmet Sabir; Genc, Ziya Alper; Kardas, Suleyman (Article)Bringer et al. proposed two cryptographic protocols for the computation of Hamming distance. Their first scheme uses Oblivious Transfer and provides security in the semi-honest model. The other scheme uses Committed Oblivious ... -
Still Wrong Use of Pairings in Cryptography
Kiraz, Mehmet Sabir; Uzunkol, Osmanbey (Article)Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, internet of things (IoT), e-health ... -
THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system
Karabat, Cagatay; Kiraz, Mehmet Sabir; Erdogan, Hakan; Savas, Erkay (Article)In this paper, we introduce a new biometric verification and template protection system which we call THRIVE. The system includes novel enrollment and authentication protocols based on threshold homomorphic encryption where ...