Skip to main content

previous disabled Page of 6
and
  1. No Access

    Article

    On two conjectures related to cubic residues

    In a recent paper by Yuan and Zhang (Indian J. Pure Appl. Math. 54(3):806–815, 2023), the authors put forward two conjectures regarding \(S_3(p)\) ...

    **aopeng Zhao, Zhenfu Cao in Indian Journal of Pure and Applied Mathematics (2024)

  2. No Access

    Article

    EMPSI: Efficient multiparty private set intersection (with cardinality)

    Multiparty private set intersection (PSI) allows several parties, each holding a set of elements, to jointly compute the intersection without leaking any additional information. With the development of cloud c...

    Yunbo Yang, **aolei Dong, Zhenfu Cao, Jiachen Shen in Frontiers of Computer Science (2023)

  3. No Access

    Article

    IXT: Improved searchable encryption for multi-word queries based on PSI

    Oblivious Cross-Tags (OXT) [1] is the first efficient searchable encryption (SE) protocol for conjunctive queries in a single-writer single-reader framework. However, it also has a trade-off between security and ...

    Yunbo Yang, **aolei Dong, Zhenfu Cao, Jiachen Shen in Frontiers of Computer Science (2023)

  4. No Access

    Chapter and Conference Paper

    Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations

    This work studies the key-alternating ciphers (KACs) whose round permutations are not necessarily independent. We revisit existing security proofs for key-alternating ciphers with a single permutation (KACSPs), a...

    Liqing Yu, Yusai Wu, Yu Yu, Zhenfu Cao, **aolei Dong in Theory of Cryptography (2023)

  5. No Access

    Chapter and Conference Paper

    MCVDSSE: Secure Multi-client Verifiable Dynamic Symmetric Searchable Encryption

    Existing multi-user dynamic symmetric searchable encryptions (DSSE) schemes unreasonably require private key sharing or require data owners to stay online. And existing verifiable DSSE is mostly based on publi...

    **yang Li, Zhenfu Cao, Jiachen Shen, **aolei Dong in Science of Cyber Security (2023)

  6. No Access

    Chapter and Conference Paper

    SVFL: Secure Vertical Federated Learning on Linear Models

    Federated learning (FL) is a popular technique that enables multiple parties to train a machine learning model collaboratively without disclosing the raw data to each other. A vertically partitioned federated ...

    Kaifeng Luo, Zhenfu Cao, Jiachen Shen, **aolei Dong in Science of Cyber Security (2023)

  7. No Access

    Chapter and Conference Paper

    Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning

    As the most popular consensus algorithm for blockchain, the Proof-of-Work (PoW) is suffering from the inability of handling computing power fluctuations. Meanwhile, PoW consumes a significant amount of energy ...

    Zhen **a, Zhenfu Cao, Jiachen Shen in Information Security Practice and Experien… (2023)

  8. No Access

    Article

    A survey on cryptographic techniques for protecting big data security: present and forthcoming

    Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world. As they significantly create economic and social value, big data meaningfull...

    Siqi Lu, Jianhua Zheng, Zhenfu Cao, Yongjuan Wang in Science China Information Sciences (2022)

  9. No Access

    Chapter and Conference Paper

    Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption

    Gordon et al. (TCC 2015) systematically studied the security of Multi-client Verifiable Computation (MVC), in which a set of computationally-weak clients outsource the computation of a general function f over the...

    **ngkai Wang, Zhenfu Cao, Zhen Liu, Kaitai Liang in Computer Security – ESORICS 2022 (2022)

  10. No Access

    Article

    A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid

    Incorporation of fog computing with low latency, preprocession (e.g., data aggregation) and location awareness, can facilitate fine-grained collection of smart metering data in smart grid and promotes the sust...

    Zhusen Liu, Zhenfu Cao, **aolei Dong, **aopeng Zhao in Frontiers of Computer Science (2021)

  11. Article

    Open Access

    Designated server-aided revocable identity-based keyword search on lattice

    Public key encryption scheme with keyword search is a promising technique supporting search on encrypted data without leaking any information about the keyword. In real applications, it’s critical to find an e...

    Ying Guo, Fei Meng, Leixiao Cheng in EURASIP Journal on Wireless Communications… (2021)

  12. No Access

    Article

    Extended Galbraith’s test on the anonymity of IBE schemes from higher residuosity

    At PKC 2019, Clear and McGoldrick presented the first identity-based encryption (IBE) scheme that is group homomorphic for addition modulo a poly-sized prime e. Assuming that deciding solvability of a special sys...

    **aopeng Zhao, Zhenfu Cao, **aolei Dong, Jun Shao in Designs, Codes and Cryptography (2021)

  13. Chapter and Conference Paper

    Tight Security Analysis of 3-Round Key-Alternating Cipher with a Single Permutation

    The tight security bound of the KAC (Key-Alternating Cipher) construction whose round permutations are independent from each other has been well studied. Then a natural question is how the security bound will ...

    Yusai Wu, Liqing Yu, Zhenfu Cao, **aolei Dong in Advances in Cryptology – ASIACRYPT 2020 (2020)

  14. No Access

    Chapter and Conference Paper

    New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol

    The e-th power residue symbol \(\left( \frac{\alpha }{\mathfrak {p}}\right) _e\) is a useful mathematical tool in cry...

    **aopeng Zhao, Zhenfu Cao, **aolei Dong, Jun Shao in Information Security and Privacy (2020)

  15. No Access

    Chapter and Conference Paper

    Anonymous IBE from Quadratic Residuosity with Fast Encryption

    We develop two variants of Cocks’ identity-based encryption. One variant has faster encryption, where the most time-consuming part only requires several modular multiplications. The other variant makes the fir...

    **aopeng Zhao, Zhenfu Cao, **aolei Dong, **wen Zheng in Information Security (2020)

  16. No Access

    Article

    Smart contract for secure billing in ride-hailing service via blockchain

    Ride-hailing service is gaining an increasing popularity due to its great advantages on fare estimation, automatic payments, and reputation ratings. However, how to build the trust between the driver and the p...

    Huajun Zhang, Erdong Deng, Hao** Zhu in Peer-to-Peer Networking and Applications (2019)

  17. No Access

    Article

    Secure key-aggregation authorized searchable encryption

    Haijiang Wang, **aolei Dong, Zhenfu Cao, Dongmei Li in Science China Information Sciences (2019)

  18. No Access

    Chapter and Conference Paper

    Efficient White-Box Traceable ABE for Vehicular Networks

    With rapid development and wide application of vehicular networks, data security is gradually valued. CP-ABE could be adopted based on the characteristics of vehicular networks data transmission. And short dec...

    Siyuan Lai, Zhenfu Cao, **aolei Dong in Recent Developments in Intelligent Computi… (2019)

  19. No Access

    Chapter and Conference Paper

    Efficient Collision Attack Frameworks for RIPEMD-160

    RIPEMD-160 is an ISO/IEC standard and has been applied to generate the Bitcoin address with SHA-256. Due to the complex dual-stream structure, the first collision attack on reduced RIPEMD-160 presented by Liu,...

    Fukang Liu, Christoph Dobraunig, Florian Mendel in Advances in Cryptology – CRYPTO 2019 (2019)

  20. Chapter and Conference Paper

    SDKSE-KGA: A Secure Dynamic Keyword Searchable Encryption Scheme Against Keyword Guessing Attacks

    A number of searchable encryption schemes have been widely proposed to solve the search problem in ciphertext domain. However, most existing searchable encryption schemes are vulnerable to keyword guessing at...

    Hongyuan Chen, Zhenfu Cao, **aolei Dong, Jiachen Shen in Trust Management XIII (2019)

previous disabled Page of 6