Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage

    Boolean Searchable Symmetric Encryption (BSSE) enables users to perform retrieval operations on the encrypted data while supporting complex query capabilities. This paper focuses on addressing the storage over...

    Feng Li, Jianfeng Ma, Yinbin Miao, Pengfei Wu in Computer Security – ESORICS 2023 (2024)

  2. No Access

    Chapter and Conference Paper

    CryptoMask: Privacy-Preserving Face Recognition

    Face recognition is a widely-used technique for identification or verification, where a verifier checks whether a face image matches anyone stored in a database. However, in scenarios where the database is hel...

    Jianli Bai, **aowu Zhang, **angfu Song in Information and Communications Security (2023)

  3. No Access

    Chapter and Conference Paper

    Lightweight Threshold Private Set Intersection via Oblivious Transfer

    As a significant basis for privacy-preserving applications of Secure Multiparty Computation (MPC), Private Set Intersection (PSI) has long been a question of great interest in a wide range of field, such as ad...

    Shengnan Zhao, Ming Ma, **angfu Song in Wireless Algorithms, Systems, and Applicat… (2021)

  4. No Access

    Chapter and Conference Paper

    Searchable Symmetric Encryption with Tunable Leakage Using Multiple Servers

    Searchable symmetric encryption has been a promising primitive as it enables a cloud user to search over outsourced encrypted data efficiently by only leaking small amount of controllable leakage. However, rec...

    **angfu Song, Dong Yin, Han Jiang in Database Systems for Advanced Applications (2020)

  5. No Access

    Chapter and Conference Paper

    Analysis on the Block Reward of Fork After Withholding (FAW)

    The irreversible trend in clustering of mining power raises severe concerns on stability and security of PoW based on cryptocurrency. It has been shown that, in some case, reward of a mining pool can be signif...

    Junming Ke, Han Jiang, **angfu Song, Shengnan Zhao, Hao Wang in Network and System Security (2018)