Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2024
TRA-PS: Accountable data Pub/Sub service with fast and fine-grained controllable subscription
Journal of Systems Architecture: the EUROMICRO Journal (JOSA), Volume 153, Issue Chttps://doi.org/10.1016/j.sysarc.2024.103197AbstractThe Cloud-based data publish/subscribe (Pub/Sub) service presents a selective manner for publishers and subscribers to share and receive data, where confidentiality and authorized access to the data are the fundamental security properties. ...
- research-articleJuly 2024
Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud
AbstractAttribute-based encryption (ABE) has been widely applied in cloud services for access control. However, a large number of pairing operations required for decryption affect the wide use of ABE on lightweight devices. A general solution is to ...
Highlights- The computational overhead of transformation-key for data users is reduced from O(N) to O(1).
- The computational overhead of verification-key generation for data users is reduced by half.
- Implement batch verification using ...
- research-articleAugust 2024
Designated server proxy re-encryption with boolean keyword search for E-Health Clouds
Journal of Information Security and Applications (JISA), Volume 83, Issue Chttps://doi.org/10.1016/j.jisa.2024.103783AbstractE-Health Cloud can provide remote, accurate, real-time, intelligent information services for healthcare. Despite the benefits brought by data outsourcing, it may also cause data breaches and compromise user privacy. Searchable encryption can ...
- research-articleJune 2024
Fully anonymous identity-based broadcast signcryption with public verification
AbstractIn the multicast communication scenario, compared with broadcast encryption, broadcast signcryption or multi-receiver signcryption has additional ability to authenticate the source of the message. With the enhanced awareness of privacy ...
- research-articleJune 2024
Provably secure multi-signature scheme based on the standard SM2 signature scheme
AbstractThe multi-signature scheme plays a crucial role in addressing trust and authentication challenges in digital transactions and other scenarios by allowing multiple users to sign the same message. Among various signature schemes, the SM2 signature ...
Highlights- The first provably secure multi-signature scheme based on the standard SM2 signature.
- Achieving EUF-CMA in the bijective random oracle model under the ECDLP assumption.
- Low communication delay and computational cost.
-
- research-articleMarch 2024
Updatable searchable symmetric encryption: Definitions and constructions
AbstractSearchable symmetric encryption (SSE) allows a client to search over encrypted data. To address the real threat of key compromise in practice, this work initiates the study of key rotation for SSE and introduces the notion of updatable SSE (USSE)...
- research-articleAugust 2024
E-Tenon: An efficient privacy-preserving secure open data sharing scheme for EHR system
Journal of Computer Security (JOCS), Volume 32, Issue 4Pages 319–348https://doi.org/10.3233/JCS-220097The transition from paper-based information to Electronic-Health-Records (EHRs) has driven various advancements in the modern healthcare industry. In many cases, patients need to share their EHR with healthcare professionals. Given the sensitive and ...
- research-articleAugust 2024
DTACB: Dynamic Threshold Anonymous Credentials With Batch-Showing
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 7744–7758https://doi.org/10.1109/TIFS.2024.3443622Threshold anonymous credentials enable users to acquire credentials in a decentralized manner while upholding their privacy. However, distributed network environments, such as electronic voting systems and federated identity management systems, have ...
- research-articleJuly 2024
FACOS: Enabling Privacy Protection Through Fine-Grained Access Control With On-Chain and Off-Chain System
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 7060–7074https://doi.org/10.1109/TIFS.2024.3427311Data-driven landscape across finance, government, and healthcare, the continuous generation of information demands robust solutions for secure storage, efficient dissemination, and fine-grained access control. Blockchain technology emerges as a ...
- research-articleJune 2024
Communication-Efficient Privacy-Preserving Neural Network Inference via Arithmetic Secret Sharing
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 6722–6737https://doi.org/10.1109/TIFS.2024.3420216Well-trained neural network models are deployed on edge servers to provide valuable inference services for clients. To protect data privacy, a promising way is to exploit various types of secret sharing to implement privacy-preserving neural network ...
- research-articleApril 2024
Dynamic Group Time-Based One-Time Passwords
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 4897–4913https://doi.org/10.1109/TIFS.2024.3386350Group time-based one-time passwords (GTOTP) is a novel lightweight cryptographic primitive for achieving anonymous client authentication, which enables the efficient generation of time-based one-time passwords on behalf of a group without revealing any ...
- ArticleDecember 2023
Improved Fully Adaptive Decentralized MA-ABE for NC1 from MDDH
AbstractWe improve the first and the only existing prime-order fully adaptively secure decentralized Multi-Authority Attribute-Based Encryption (MA-ABE) scheme for NC1 in Datta-Komargodski-Waters [Eurocrypt ’23]. Compared with Datta-Komargodski-Waters, ...
- surveyNovember 2023
A Survey on Searchable Symmetric Encryption
ACM Computing Surveys (CSUR), Volume 56, Issue 5Article No.: 119, Pages 1–42https://doi.org/10.1145/3617991Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption (SSE), one of the methods for protecting outsourced data, has arisen widespread interest. Moreover, many novel technologies and theories have emerged, especially for ...
- research-articleSeptember 2023
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 20, Issue 5Pages 4101–4117https://doi.org/10.1109/TDSC.2022.3206758Privacy-preserving pattern matching enables a user to find all occurrences of a pattern in a text without revealing any sensitive information. However, many previous works designed on homomorphic encryption suffer from expensive computational overhead and ...
- research-articleAugust 2023
Deep-Reuse-Enabled Common Satellite Network via Collaborative Blockchains: Architecture, Challenges, and Solutions
IEEE Communications Magazine (COMAG), Volume 61, Issue 8Pages 130–136https://doi.org/10.1109/MCOM.006.2200835Satellite networks, as a recent deployment for technical and economic progress, have shown great advantages to provide diversiform Internet services. However, the networks are grappling with severe congestion caused by a surge in simultaneous requests, ...
- research-articleJuly 2023
Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health System
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 4Pages 1845–1862https://doi.org/10.1109/TDSC.2023.3292129The cloud-assisted mobile electronic health (e-health) system facilitates e-health data sharing between healthcare providers and patients, but also raises the security and privacy concerns of e-health data. Although Ciphertext-Policy Attribute-Based ...
- research-articleJune 2023
VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 4Pages 1785–1800https://doi.org/10.1109/TDSC.2023.3290562In this article, we present <italic>VerifyML</italic>, the first secure inference framework to check the fairness degree of a given Machine learning (ML) model. <italic>VerifyML</italic> is generic and is immune to any obstruction by the malicious model ...
- research-articleJune 2023
SIMC 2.0: Improved Secure ML Inference Against Malicious Clients
- Guowen Xu,
- Xingshuo Han,
- Tianwei Zhang,
- Shengmin Xu,
- Jianting Ning,
- Xinyi Huang,
- Hongwei Li,
- Robert H. Deng
IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 21, Issue 4Pages 1708–1723https://doi.org/10.1109/TDSC.2023.3288557In this paper, we study the problem of secure ML inference against a malicious client and a semi-trusted server such that the client only learns the inference output while the server learns nothing. This problem is first formulated by Lehmkuhl et al. with ...
- research-articleMay 2023
Time-Controllable Keyword Search Scheme With Efficient Revocation in Mobile E-Health Cloud
- Yinbin Miao,
- Feng Li,
- Xinghua Li,
- Zhiquan Liu,
- Jianting Ning,
- Hongwei Li,
- Kim-Kwang Raymond Choo,
- Robert H. Deng
IEEE Transactions on Mobile Computing (ITMV), Volume 23, Issue 5Pages 3650–3665https://doi.org/10.1109/TMC.2023.3277702Electronic health (e-health) systems may outsource data such as patient e-health records to mobile cloud servers for efficiency gains (e.g., minimizing local storage and computation costs). However, such a move may result in privacy implications in the ...
- research-articleApril 2023
BASRAC: An efficient batch authentication scheme with rule-based access control for VANETs
AbstractSecurity and privacy protection are important requirements of vehicular ad hoc networks (VANETs). In recent years, many authentication schemes have been proposed to solve the security and privacy issues in VANETs. However, almost all ...