![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model
Traditional secret sharing assume the absolute secrecy of the private shares of the uncorrupted users. It may not hold in the real world due to the side-channel attacks. Leakage-resilient cryptography is propo...
-
Chapter and Conference Paper
Acceleration of Composite Order Bilinear Pairing on Graphics Hardware
Recently, composite-order bilinear pairing has been shown to be useful in many cryptographic constructions. However, it is time-costly to evaluate. This is because the composite order should be at least 1024bi...
-
Chapter and Conference Paper
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones
Mobile phone use – and mobile phone piracy – have increased dramatically during the last decade. Because of the profits that can be made, more than four hundred pirated brands of mobile phones are available in...
-
Chapter and Conference Paper
SPICE – Simple Privacy-Preserving Identity-Management for Cloud Environment
Identity security and privacy have been regarded as one of the top seven cloud security threats. There are a few identity management solutions proposed recently trying to tackle these problems. However, none o...
-
Chapter and Conference Paper
Fully Leakage-Resilient Signatures with Auxiliary Inputs
The auxiliary input model for leakage-resilient encryption considers the leakage of a computationally hard-to-invert function, which can capture a wide class of possible side channel attacks. To avoid the triv...
-
Chapter and Conference Paper
Identity-Based Encryption Resilient to Continual Auxiliary Leakage
We devise the first identity-based encryption (IBE) that remains secure even when the adversary is equipped with auxiliary input (STOC ’09) – any computationally uninvertible function of the master secret key and...
-
Chapter and Conference Paper
PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation
Anonymous authentication schemes allow users to act freely without being tracked. The users may not want to trust a third party in ensuring their privacy, yet a service provider (SP) should have the authority ...
-
Chapter and Conference Paper
Oblivious Transfer with Access Control : Realizing Disjunction without Duplication
Oblivious Transfer with Access Control (AC-OT) is a protocol which allows a user to obtain a database record with a credential satisfying the access policy of the record while the database server learns nothin...