Skip to main content

Page of 3 next disabled
and
  1. Chapter and Conference Paper

    Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model

    Traditional secret sharing assume the absolute secrecy of the private shares of the uncorrupted users. It may not hold in the real world due to the side-channel attacks. Leakage-resilient cryptography is propo...

    Hao **ong, Cong Zhang, Tsz Hon Yuen in Information and Communications Security (2012)

  2. Chapter and Conference Paper

    Acceleration of Composite Order Bilinear Pairing on Graphics Hardware

    Recently, composite-order bilinear pairing has been shown to be useful in many cryptographic constructions. However, it is time-costly to evaluate. This is because the composite order should be at least 1024bi...

    Ye Zhang, Chun Jason Xue, Duncan S. Wong in Information and Communications Security (2012)

  3. Chapter and Conference Paper

    Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones

    Mobile phone use – and mobile phone piracy – have increased dramatically during the last decade. Because of the profits that can be made, more than four hundred pirated brands of mobile phones are available in...

    Junbin Fang, Zoe Jiang, Kam-Pui Chow, Siu-Ming Yiu in Advances in Digital Forensics VIII (2012)

  4. Chapter and Conference Paper

    SPICE – Simple Privacy-Preserving Identity-Management for Cloud Environment

    Identity security and privacy have been regarded as one of the top seven cloud security threats. There are a few identity management solutions proposed recently trying to tackle these problems. However, none o...

    Sherman S. M. Chow, Yi-Jun He, Lucas C. K. Hui in Applied Cryptography and Network Security (2012)

  5. No Access

    Chapter and Conference Paper

    Fully Leakage-Resilient Signatures with Auxiliary Inputs

    The auxiliary input model for leakage-resilient encryption considers the leakage of a computationally hard-to-invert function, which can capture a wide class of possible side channel attacks. To avoid the triv...

    Tsz Hon Yuen, Siu Ming Yiu, Lucas C. K. Hui in Information Security and Privacy (2012)

  6. Chapter and Conference Paper

    Identity-Based Encryption Resilient to Continual Auxiliary Leakage

    We devise the first identity-based encryption (IBE) that remains secure even when the adversary is equipped with auxiliary input (STOC ’09) – any computationally uninvertible function of the master secret key and...

    Tsz Hon Yuen, Sherman S. M. Chow, Ye Zhang in Advances in Cryptology – EUROCRYPT 2012 (2012)

  7. Chapter and Conference Paper

    PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation

    Anonymous authentication schemes allow users to act freely without being tracked. The users may not want to trust a third party in ensuring their privacy, yet a service provider (SP) should have the authority ...

    Kin Ying Yu, Tsz Hon Yuen, Sherman S. M. Chow in Computer Security – ESORICS 2012 (2012)

  8. No Access

    Chapter and Conference Paper

    Oblivious Transfer with Access Control : Realizing Disjunction without Duplication

    Oblivious Transfer with Access Control (AC-OT) is a protocol which allows a user to obtain a database record with a credential satisfying the access policy of the record while the database server learns nothin...

    Ye Zhang, Man Ho Au, Duncan S. Wong in Pairing-Based Cryptography - Pairing 2010 (2010)

Page of 3 next disabled