Skip to main content

Showing 1–6 of 6 results for author: Grierson, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2411.17321  [pdf, other

    cs.CR

    A Framework for the Security and Privacy of Biometric System Constructions under Defined Computational Assumptions

    Authors: Sam Grierson, William J Buchanan, Craig Thomson, Baraq Galeb, Chris Eckl

    Abstract: Biometric systems, while offering convenient authentication, often fall short in providing rigorous security assurances. A primary reason is the ad-hoc design of protocols and components, which hinders the establishment of comprehensive security proofs. This paper introduces a formal framework for constructing secure and privacy-preserving biometric systems. By leveraging the principles of univers… ▽ More

    Submitted 26 November, 2024; originally announced November 2024.

  2. arXiv:2403.05271  [pdf, other

    cs.CR

    DID:RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity

    Authors: Dimitrios Kasimatis, Sam Grierson, William J. Buchanan, Chris Eckl, Pavlos Papadopoulos, Nikolaos Pitropakis, Craig Thomson, Baraq Ghaleb

    Abstract: Decentralised identifiers have become a standardised element of digital identity architecture, with supra-national organisations such as the European Union adopting them as a key component for a unified European digital identity ledger. This paper delves into enhancing security and privacy features within decentralised identifiers by integrating ring signatures as an alternative verification metho… ▽ More

    Submitted 11 March, 2024; v1 submitted 8 March, 2024; originally announced March 2024.

  3. arXiv:2401.07691  [pdf, other

    cs.CR

    Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) using Bilinear Group Accumulators in Batch Mode

    Authors: William J Buchanan, Sam Grierson, Daniel Uribe

    Abstract: Biometric data is often highly sensitive, and a leak of this data can lead to serious privacy breaches. Some of the most sensitive of this type of data relates to the usage of DNA data on individuals. A leak of this type of data without consent could lead to privacy breaches of data protection laws. Along with this, there have been several recent data breaches related to the leak of DNA informatio… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

  4. arXiv:2310.04898  [pdf, other

    cs.CR

    Scalable Multi-domain Trust Infrastructures for Segmented Networks

    Authors: Sam Grierson, William J Buchanan, Craig Thomson, Baraq Ghaleb, Leandros Maglaras, Chris Eckl

    Abstract: Within a trust infrastructure, a private key is often used to digitally sign a transaction, which can be verified with an associated public key. Using PKI (Public Key Infrastructure), a trusted entity can produce a digital signature, verifying the authenticity of the public key. However, what happens when external entities are not trusted to verify the public key or in cases where there is no Inte… ▽ More

    Submitted 10 October, 2023; v1 submitted 7 October, 2023; originally announced October 2023.

  5. arXiv:2308.15009  [pdf, ps, other

    cs.CR

    Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations

    Authors: Sam Grierson, Konstantinos Chalkias, William J Buchanan, Leandros Maglaras

    Abstract: EdDSA is a standardised elliptic curve digital signature scheme introduced to overcome some of the issues prevalent in the more established ECDSA standard. Due to the EdDSA standard specifying that the EdDSA signature be deterministic, if the signing function were to be used as a public key signing oracle for the attacker, the unforgeability notion of security of the scheme can be broken. This pap… ▽ More

    Submitted 10 October, 2023; v1 submitted 29 August, 2023; originally announced August 2023.

  6. arXiv:0912.3398  [pdf, other

    cs.MS

    NetEvo: A computational framework for the evolution of dynamical complex networks

    Authors: Thomas E. Gorochowski, Mario di Bernardo, Claire S. Grierson

    Abstract: NetEvo is a computational framework designed to help understand the evolution of dynamical complex networks. It provides flexible tools for the simulation of dynamical processes on networks and methods for the evolution of underlying topological structures. The concept of a supervisor is used to bring together both these aspects in a coherent way. It is the job of the supervisor to rewire the ne… ▽ More

    Submitted 17 December, 2009; originally announced December 2009.

    ACM Class: D.0