Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications

    Public-key encryption with keyword search (PEKS) was first proposed by Boneh et al. (EUROCRYPT 2004), achieving the ability to search for ciphertext files. Nevertheless, it is vulnerable to inside keyword guessin...

    Shiyuan Xu, Yibo Cao, Xue Chen, Yanmin Zhao in Information Security and Cryptology (2024)

  2. No Access

    Chapter and Conference Paper

    Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES

    We consider the related-tweak impossible differential cryptanalysis of TweAES. It is one of the underlying primitives of Authenticated Encryption with Associated Data (AEAD) scheme ESTATE which was accepted as on...

    Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang in Selected Areas in Cryptography (2022)

  3. No Access

    Chapter and Conference Paper

    Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability

    Time-lock puzzle schemes allow one to encrypt messages for the future. More concretely, one can efficiently generate a time-lock puzzle for a secret/solution s, such that s remains hidden until a specified time T

    Yi Liu, Qi Wang, Siu-Ming Yiu in Computer Security – ESORICS 2022 (2022)

  4. No Access

    Chapter and Conference Paper

    Forced Independent Optimized Implementation of 4-Bit S-Box

    Searching the optimal circuit implementation of a Boolean function is still an open problem. This work proposes a new optimizing scheme, which could find circuit expressions with optimal gate equivalent comple...

    Yanhong Fan, Weijia Wang, Zhihu Li, Zhenyu Lu in Information Security and Privacy (2021)

  5. No Access

    Chapter and Conference Paper

    A Secure and Self-tallying E-voting System Based on Blockchain

    E-voting has been studied for many years. Recently, researchers find that blockchain can provide an alternative secure platform for e-voting systems, because of its properties of tamper resistance and transpar...

    Gongxian Zeng, Meiqi He, Siu Ming Yiu in Information Security Applications (2020)

  6. No Access

    Chapter and Conference Paper

    Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model

    We propose a leakage-resilient inner-product functional encryption scheme (IPFE) in the bounded-retrieval model (BRM). This is the first leakage-resilient functional encryption scheme in the BRM. In our leakag...

    Linru Zhang, **angning Wang, Yuechen Chen in Information and Communications Security (2020)

  7. No Access

    Chapter and Conference Paper

    LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation)

    Due to the advancement of side-channel attacks, leakage-resilient cryptography has attracted a lot of attention in recent years. Many fruitful results have been proposed by researchers. Most, if not all, of th...

    **aoqi Yu, Nairen Cao, Gongxian Zeng, Ruoqing Zhang in Information Security Applications (2017)

  8. Chapter and Conference Paper

    Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery

    Elastic net is a popular linear regression tool and has many important applications, in particular, finding genomic biomarkers for cancers from gene expression profiles for personalized medicine (elastic net i...

    Jun Zhang, Meiqi He, Siu-Ming Yiu in Data and Applications Security and Privacy XXXI (2017)

  9. Chapter and Conference Paper

    Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner

    Smart grid facilitates a customer to sell unused or self-generated power back to the grid. This not only helps the power operator to reduce power generation, but also brings customers a means of getting revenu...

    Tat Wing Chim, Siu Ming Yiu, Lucas Chi Kwong Hui in Information and Communications Security (2012)

  10. Chapter and Conference Paper

    Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model

    Traditional secret sharing assume the absolute secrecy of the private shares of the uncorrupted users. It may not hold in the real world due to the side-channel attacks. Leakage-resilient cryptography is propo...

    Hao **ong, Cong Zhang, Tsz Hon Yuen in Information and Communications Security (2012)

  11. Chapter and Conference Paper

    Acceleration of Composite Order Bilinear Pairing on Graphics Hardware

    Recently, composite-order bilinear pairing has been shown to be useful in many cryptographic constructions. However, it is time-costly to evaluate. This is because the composite order should be at least 1024bi...

    Ye Zhang, Chun Jason Xue, Duncan S. Wong in Information and Communications Security (2012)

  12. Chapter and Conference Paper

    Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones

    Mobile phone use – and mobile phone piracy – have increased dramatically during the last decade. Because of the profits that can be made, more than four hundred pirated brands of mobile phones are available in...

    Junbin Fang, Zoe Jiang, Kam-Pui Chow, Siu-Ming Yiu in Advances in Digital Forensics VIII (2012)

  13. Chapter and Conference Paper

    SPICE – Simple Privacy-Preserving Identity-Management for Cloud Environment

    Identity security and privacy have been regarded as one of the top seven cloud security threats. There are a few identity management solutions proposed recently trying to tackle these problems. However, none o...

    Sherman S. M. Chow, Yi-Jun He, Lucas C. K. Hui in Applied Cryptography and Network Security (2012)

  14. Chapter and Conference Paper

    Identity-Based Encryption Resilient to Continual Auxiliary Leakage

    We devise the first identity-based encryption (IBE) that remains secure even when the adversary is equipped with auxiliary input (STOC ’09) – any computationally uninvertible function of the master secret key and...

    Tsz Hon Yuen, Sherman S. M. Chow, Ye Zhang in Advances in Cryptology – EUROCRYPT 2012 (2012)

  15. No Access

    Chapter and Conference Paper

    Oblivious Transfer with Access Control : Realizing Disjunction without Duplication

    Oblivious Transfer with Access Control (AC-OT) is a protocol which allows a user to obtain a database record with a credential satisfying the access policy of the record while the database server learns nothin...

    Ye Zhang, Man Ho Au, Duncan S. Wong in Pairing-Based Cryptography - Pairing 2010 (2010)