Skip to main content

and
  1. Chapter and Conference Paper

    Correction to: Half-Tree: Halving the Cost of Tree Expansion in COT and DPF

    **aojie Guo, Kang Yang, **ao Wang, Wenhao Zhang in Advances in Cryptology – EUROCRYPT 2023 (2023)

  2. No Access

    Chapter and Conference Paper

    Half-Tree: Halving the Cost of Tree Expansion in COT and DPF

    GGM tree is widely used in the design of correlated oblivious transfer (COT), subfield vector oblivious linear evaluation (sVOLE), distributed point function (DPF), and distributed comparison function (DCF). O...

    **aojie Guo, Kang Yang, **ao Wang, Wenhao Zhang in Advances in Cryptology – EUROCRYPT 2023 (2023)

  3. No Access

    Book and Conference Proceedings

    Cloud Computing, Security, Privacy in New Computing Environments

    7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings

    Jiafu Wan, Kai Lin, Delu Zeng, ** Li in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (2018)

  4. No Access

    Chapter and Conference Paper

    DMSD-FPE: Data Masking System for Database Based on Format-Preserving Encryption

    The traditional data masking systems cannot provide reversible operations for database, and they will destroy the referential integrity of database. To solve the problems above, we provide a new data masking s...

    Mingming Zhang, Guiyang **e, Shimeng Wei in Cloud Computing, Security, Privacy in New … (2018)

  5. No Access

    Chapter and Conference Paper

    Generalized Format-Preserving Encryption for Character Data

    We studied the problem on applying format-preserving encryption (FPE) to character data, specifically the uncertainty of the binary size of ciphertexts caused by variable-width encoding. In this paper, we sugg...

    Yanyu Huang, Bo Li, Shuang Liang, Haoyu Ma in Cloud Computing, Security, Privacy in New … (2018)

  6. No Access

    Chapter and Conference Paper

    Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage

    In a secure data sharing system, the keyword search over encrypted files is a basic need of a user with appropriate privileges. Although the traditional searchable encryption technique can provide the privacy ...

    Tong Li, Zheli Liu, ** Li, Chunfu Jia, Zoe L. Jiang in Information Security and Privacy (2016)

  7. No Access

    Chapter and Conference Paper

    Public Key Timed-Release Attribute-Based Encryption

    This paper introduces and explores a new concept of public key timed-release attribute-based encryption (PKTRABE) which can be used to solve the time-dependent ABE problem. In our PKTRABE model, the sender enc...

    Ke Yuan, Nan Shen, Yonghang Yan, Zheli Liu in Applications and Techniques in Information… (2015)

  8. No Access

    Chapter and Conference Paper

    TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage

    Data sharing systems based on cloud storage have attracted much attention recently. In such systems, encryption techniques are usually utilized to protect the privacy of outsourced sensitive data. However, to ...

    Zheli Liu, ** Li, **aofeng Chen, Jun Yang, Chunfu Jia in Information Security and Privacy (2014)

  9. No Access

    Chapter and Conference Paper

    Secure Storage and Fuzzy Query over Encrypted Databases

    Outsourcing database has attracted much attention recently due to the emergence of Cloud Computing. However, there are still two problems to solve, 1) how to encipher and protect the sensitive information befo...

    Zheli Liu, Haoyu Ma, ** Li, Chunfu Jia, **gwei Li, Ke Yuan in Network and System Security (2013)

  10. No Access

    Chapter and Conference Paper

    Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud

    As cloud computing becomes prevalent, more and more sensitive information is being centralized into the cloud, which raises a new challenge on how to efficiently share the outsourced data in a fine-grained man...

    **gwei Li, ** Li, **aofeng Chen, Chunfu Jia, Zheli Liu in Network and System Security (2012)