Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
Achieving federated logistic regression training towards model confidentiality with semi-honest TEE
Information Sciences: an International Journal (ISCI), Volume 679, Issue Chttps://doi.org/10.1016/j.ins.2024.121115AbstractIn the distributed machine learning field, federated learning (FL) serves as a highly effective framework for dismantling data silos and integrating data from multiple sources. However, the flourishing of FL still encounters significant ...
Highlights- A fine-grained Cryptography-TEE hybrid security model for multi-party cooperative computation scenario is defined.
- A series of TEE-assisted secure computation protocols are designed to achieve secure and lossless non-linear operations.
- research-articleSeptember 2024
Protocol-based SMC for singularly perturbed systems with switching parameters and deception attacks
Information Sciences: an International Journal (ISCI), Volume 679, Issue Chttps://doi.org/10.1016/j.ins.2024.121089AbstractThis research paper investigates a protocol-based sliding mode control (SMC) approach for singularly perturbed systems with switching parameters and random occurring deception attacks. The mode switching behavior of the original system is ...
- research-articleSeptember 2024
Chaotic image encryption algorithm based on bit-level feedback adjustment
Information Sciences: an International Journal (ISCI), Volume 679, Issue Chttps://doi.org/10.1016/j.ins.2024.121088AbstractThis paper proposes a fast bit-level chaotic image encryption algorithm. The goal is to make the difference between 0 and 1 in the bit-level ciphertext as small as possible. By introducing the concept of the difference between 0 and 1, constantly ...
- research-articleSeptember 2024
An iterative correction method for practically LPN solving
Information Sciences: an International Journal (ISCI), Volume 679, Issue Chttps://doi.org/10.1016/j.ins.2024.121080AbstractThe LPN problem, lying at the core of many cryptographic constructions for lightweight and post-quantum cryptography, has recently received much attention. Accordingly, BKW, Gauss algorithm, and their improved or hybrid variants have been ...
- research-articleSeptember 2024
The EEG signals steganography based on wavelet packet transform-singular value decomposition-logistic
- Dong Wen,
- Wenlong Jiao,
- Xiaoling Li,
- Xianglong Wan,
- Yanhong Zhou,
- Xianling Dong,
- Haiqing Song,
- Wei Han,
- Tiange Liu,
- Dingna Duan
Information Sciences: an International Journal (ISCI), Volume 679, Issue Chttps://doi.org/10.1016/j.ins.2024.121006AbstractBrain-computer interface (BCI) technology is widely used in online medicine for the diagnosis and treatment of brain diseases. However, during brain-computer interaction, Electroencephalogram (EEG) signals and private information may be leaked ...
-
- research-articleMarch 2024
Synchronization of fuzzy-chaotic systems with Z-controller in secure communication
Information Sciences: an International Journal (ISCI), Volume 657, Issue Chttps://doi.org/10.1016/j.ins.2023.119988AbstractSoft Computing approaches may be effectively used for the aim to improve security of communication systems. Recently, we proposed a technique for fuzzy-chaotic masking signals generation. In this paper we developed this approach further. It is ...
- research-articleMarch 2024
An efficient algorithm deciding chaos for linear cellular automata over ( Z / m Z ) n with applications to data encryption
Information Sciences: an International Journal (ISCI), Volume 657, Issue Chttps://doi.org/10.1016/j.ins.2023.119942AbstractWe provide an efficient algorithm deciding chaos for linear cellular automata (LCA) over ( Z / m Z ) n, a large and important class of cellular automata (CA) which may exhibit many of the complex features typical of general CA and are used in ...
- research-articleMarch 2024
Secure message recovery in presence of the cyber-attack using discrete-time chaotic modulation approach
Information Sciences: an International Journal (ISCI), Volume 657, Issue Chttps://doi.org/10.1016/j.ins.2023.119923AbstractThe secure message recovery problem in presence of cyber-attack is considered in this paper. The message is modulated by a master chaotic system which may be vulnerable to a cyber-attack and then transmitted to a receiver. By designing a novel ...
- research-articleFebruary 2024
Ideal uniform multipartite secret sharing schemes
Information Sciences: an International Journal (ISCI), Volume 655, Issue Chttps://doi.org/10.1016/j.ins.2023.119907AbstractMultipartite secret sharing schemes are those having a multipartite access structure, in which the set of participants is divided into several parts and all participants in the same part play an equivalent role. Secret sharing schemes for these ...
- research-articleFebruary 2024
HRA-secure attribute-based threshold proxy re-encryption from lattices
Information Sciences: an International Journal (ISCI), Volume 655, Issue Chttps://doi.org/10.1016/j.ins.2023.119900AbstractProxy re-encryption (PRE) allows a semi-trust proxy with a re-encryption key to transform a ciphertext encrypted under one key to an encryption of the same message under another key. Attribute-based proxy re-encryption (AB-PRE) is a ...
Highlights- Proxy re-encryption in a threshold system to resolve the problems of single point of failure and proxy-user collusion.
- Attribute based threshold proxy re-encryption to provide fine-grained access control and delegation of encrypted ...
- research-articleFebruary 2024
A novel lightweight decentralized attribute-based signature scheme for social co-governance
Information Sciences: an International Journal (ISCI), Volume 654, Issue Chttps://doi.org/10.1016/j.ins.2023.119839Highlights- It constructs a lightweight DABS signature scheme with unconditional full anonymity scheme to protect system users’ privacy.
- It proposed a social co-governance system based on LWBT-DABS to monitor the public network and deter user ...
Social co-governance is an effective way to solve public safety incidents such as COVID-19 incident. But the insiders wouldn’t share the firsthand information for fear of cyber-violence. Though most of researches paid attention to the data access ...
- research-articleFebruary 2024
Secure and efficient multi-key aggregation for federated learning
Information Sciences: an International Journal (ISCI), Volume 654, Issue Chttps://doi.org/10.1016/j.ins.2023.119830AbstractFederated learning (FL) is a distributed machine learning framework that aims to provide privacy for local datasets while learning a global machine learning model. However, the updates exchanged in FL may indirectly reveal information about the ...
- research-articleFebruary 2024
Secure Internet of medical Things (IoMT) based on ECMQV-MAC authentication protocol and EKMC-SCP blockchain networking
Information Sciences: an International Journal (ISCI), Volume 654, Issue Chttps://doi.org/10.1016/j.ins.2023.119783Highlights- The mutual user authentication ECMQV-MAC protocol is under a secure data storage.
- A legal authentication for the user to access the Blockchain networking (BCN) avoids large data storage.
- The privacy of the data is more robust ...
The Internet of Medical Things (IoMT) is a collection of healthcare technologies (medical equipment, software applications, and services) that allows doctors, care providers, and medical test centers to store and exchange health data ...
- research-articleJanuary 2024
Hybrid watermarking algorithm for medical images based on digital transformation and MobileNetV2
Information Sciences: an International Journal (ISCI), Volume 653, Issue Chttps://doi.org/10.1016/j.ins.2023.119810AbstractThe current study presents a new methodology for zero watermarking that relies on the discrete wavelet transform (DWT) and an improved MobileNetV2 convolutional neural network, along with the discrete cosine transform (DCT). This model is ...
- research-articleJanuary 2024
Fast and private multi-dimensional range search over encrypted data
Information Sciences: an International Journal (ISCI), Volume 652, Issue Chttps://doi.org/10.1016/j.ins.2023.119773AbstractFor businesses looking to outsource their data to remote servers, cloud-based data storage is a popular choice. It is popular due to its flexibility, cost-effectiveness, and widespread availability. However, ensuring the confidentiality of data ...
- research-articleJanuary 2024
Efficient and anonymous password-hardened encryption services
Information Sciences: an International Journal (ISCI), Volume 653, Issue Chttps://doi.org/10.1016/j.ins.2023.119771AbstractPassword-based authentication and encryption schemes are commonly employed to ensure data privacy. Nevertheless, these schemes are vulnerable to brute-force attacks, as user passwords have low-entropy. Password-hardened encryption (PHE) was ...
- research-articleDecember 2023
Efficient and privacy-preserving tree-based inference via additive homomorphic encryption
Information Sciences: an International Journal (ISCI), Volume 650, Issue Chttps://doi.org/10.1016/j.ins.2023.119480AbstractDue to the excellent efficiency and high interpretability, coupled with the accuracy comparable to deep learning on tabular data, various tree-based models have been widely concerned and succeeded in many fields like medical diagnosis, credit ...
Highlights- A novel tree-based inference scheme.
- High-accuracy and transparent outsourcing inference services for users.
- Strong privacy preservation for data, model parameters, and inference results.
- Only one cloud server required.
- Low ...
- research-articleJune 2023
Towards provably secure asymmetric image encryption schemes
Information Sciences: an International Journal (ISCI), Volume 631, Issue CPages 164–184https://doi.org/10.1016/j.ins.2023.02.057AbstractImage encryption schemes that use substitution box (S-box) generators, and dynamic S-boxes in particular, have attracted wide research interest recently. Typically, the security of S-box generators is tested empirically, and thus encryption ...
- research-articleJune 2023
Enabling scalable and unlinkable payment channel hubs with oblivious puzzle transfer
Information Sciences: an International Journal (ISCI), Volume 630, Issue CPages 713–726https://doi.org/10.1016/j.ins.2023.02.024AbstractPayment channel networks (PCNs) are effective techniques for extending the scalability of cryptocurrencies. It achieves this by establishing a direct off-line channel from the sender to the receiver, going through one intermediary (aka. the hubs)...
Highlights- We construct a payment channel scheme. ObliHub uses the OPT to achieve the unlinkability and atomicity of transfers (§3).
- We propose an oblivious puzzle transfer (OPT) protocol and prove its security based on the UC framework (§4).
- research-articleMay 2023
Traceable one-time address solution to the interactive blockchain for digital museum assets
Information Sciences: an International Journal (ISCI), Volume 625, Issue CPages 157–174https://doi.org/10.1016/j.ins.2022.12.084Highlights- We propose a traceable one-time address scheme.
- We define an anonymous identity ...
Blockchain systems often use public keys or addresses as pseudonym accounts to protect the identity of users. However, as the blockchain system is transparent, an adversary can analyze all the public keys or addresses and obtain some ...