Privacy-preserving Byzantine-robust federated learning
- We propose a scheme of Privacy-preserving Byzantine-robust federated learning (PBFL).
Robustness of federated learning has become one of the major concerns since some Byzantine adversaries, who may upload false data owning to unreliable communication channels, corrupted hardware or even malicious attacks, might be ...
Repudiable ring signature: Stronger security and logarithmic-size
- The security model of repudiable ring signature is improved.
- A more efficient ...
Ring signature, introduced by Rivest et al. [Asiacrypt’01], allows a person to sign a document on behalf of an ad-hoc group (or ring) while hiding the identity of the actual signer. But the anonymity provided by the ring signature ...
Availability and service disruption of network services: From high-level requirements to low-level configuration constraints
- A method for the availability of network services in the context of NFV
- A ...
In the context of Network Function Virtualization (NFV), a Network Service (NS) is defined as a composition of Network Functions (NFs), which can be Virtual Network Functions (VNFs) or Physical Network Functions (PNFs). The ...
Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment
- Proposed a new authentication and key management scheme for IoT-enabled IPA, called AKMSAgriIoT, with the private blockchain-based solution.
In an Intelligent Precision Agriculture (IPA), several Internet of Things (IoT) smart devices and drones can be deployed to monitor an agricultural environment. The drones can be further utilized to collect the data from smart devices ...
Designing secure and lightweight user access to drone for smart city surveillance
- Sajid Hussain,
- Khalid Mahmood,
- Muhammad Khurram Khan,
- Chien-Ming Chen,
- Bander A. Alzahrani,
- Shehzad Ashraf Chaudhry
- This paper proves that the user access to drone scheme of Wazid et al. is vulnerable to several attacks including stolen verifier, traceability attacks.
The Internet of drones (IoD) is a very useful application of the Internet of things (IoT) and it can help the daily life comfort through various functions including the smart city surveillance. The IoD can enhance the comfort to reach ...
An IoT-based approach for optimal relative positioning of solar panel arrays during backtracking
- The demand to meet emerging delay constraint IoT design and usage in solar energy plants has been highlighted and an effective application is introduced co-...
There are several studies in the literature and common solutions in practice about solar tracking systems (STSs) and their effective usage in solar power plants. However, they all mainly lack of a serious consideration to eliminate the ...
Side-channel information leakage analysis and countermeasures in an embedded CPU microarchitecture
- Based on the implementation of the AES-128, a detailed analysis of side-channel information leakage in an embedded CPU and its components from the ...
Side-channel attacks (SCAs) have become a significant threat nowadays to cryptographic devices, especially central processing units (CPUs). Based on the implementation of AES-128, the side-channel information leakage analysis is ...
Integration of fuzzy-weighted zero-inconsistency and fuzzy decision by opinion score methods under a q-rung orthopair environment: A distribution case study of COVID-19 vaccine doses
- A.S. Albahri,
- O.S. Albahri,
- A.A. Zaidan,
- Alhamzah Alnoor,
- H.A. Alsattar,
- Rawia Mohammed,
- A.H. Alamoodi,
- B.B. Zaidan,
- Uwe Aickelin,
- Mamoun Alazab,
- Salem Garfan,
- Ibraheem Y.Y. Ahmaro,
- M.A. Ahmed
- Formulated an extension of FWZIC method under fuzzy environment q-ROFS were called q-ROFWZIC.
Owing to the limitations of Pythagorean fuzzy and intuitionistic fuzzy sets, scientists have developed a distinct and successive fuzzy set called the q-rung orthopair fuzzy set (q-ROFS), which eliminates restrictions encountered by ...
Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks
- Introduce a new primitive called committed oblivious linear evaluation (C-OLE) based on the homomorphic commitments in the malicious model.
In the artificial intelligence era, data-driven computation tasks, such as machine learning, have been playing an essential role as the decision-maker to unlock the value of big data in many fields. Moreover, the ultimate goal of ...
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security
- Construct six types of share conversion protocols in the malicious model with the homomorphic commitments technique relying on the standard model.
With the rapid development of secure multi-party computation (MPC) over past decades, applications of MPC has been moving from completing simple computation tasks (e.g., private set intersection) to complex computation tasks (e.g., ...
A new secure arrangement for privacy-preserving data collection
- A secure arrangement is proposed in the manuscript, which is important for privacy data collection.
A big number of users’ healthy data are necessary for the Internet of Things (IoT) healthcare. Therefore, the institutions, which have access to more data can provide better medical services such as more accurate diagnosis. However, ...
A novel and efficient index based web service discovery approach
- We propose in this paper a new index scheme that aims at reducing the retrieval time comparing to MLIM (The Muti Level Index Model) and the inverted index.
Nowadays, with the expansion of the number of web services, the discovery and the selection of the latter are becoming complex tasks. To address this issue, different methods (indexing, clustering, database etc.) have been proposed in ...
A process assessment model for big data analytics
- Provides a review of the available capability maturity models in BDA domain.
- ...
Today, business success is essentially powered by data-centric software. Big data analytics (BDA) grasp the potential of generating valuable insights and empowering businesses to support their strategic decision-making. However, ...
Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis
- Wan Nur Aqlili Wan Mohd Ruzai,
- Abderrahmane Nitaj,
- Muhammad Rezal Kamel Ariffin,
- Zahari Mahad,
- Muhammad Asyraf Asbullah
- A new weak RSA key equation structure that solves the factoring problem under certain specified conditions in polynomial time is proposed.
The public parameters of the RSA cryptosystem are represented by the pair of integers N and e. In this work, first we show that if e satisfies the Diophantine equation of the form e x 2 − ϕ ( N ) y 2 = z for appropriate values of x , y ...
Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption
- A federated learning scheme with homomorphic re-encryption is proposed, which collects data from the IoT devices, completes model training through the fog ...
Unlike traditional centralized machine learning, distributed machine learning provides more efficient and useful application scenarios. However, distributed learning may not meet some security requirements. For example, in medical ...