114 Result(s)
-
Article
On two conjectures related to cubic residues
In a recent paper by Yuan and Zhang (Indian J. Pure Appl. Math. 54(3):806–815, 2023), the authors put forward two conjectures regarding \(S_3(p)\) ...
-
Article
EMPSI: Efficient multiparty private set intersection (with cardinality)
Multiparty private set intersection (PSI) allows several parties, each holding a set of elements, to jointly compute the intersection without leaking any additional information. With the development of cloud c...
-
Article
IXT: Improved searchable encryption for multi-word queries based on PSI
Oblivious Cross-Tags (OXT) [1] is the first efficient searchable encryption (SE) protocol for conjunctive queries in a single-writer single-reader framework. However, it also has a trade-off between security and ...
-
Chapter and Conference Paper
Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations
This work studies the key-alternating ciphers (KACs) whose round permutations are not necessarily independent. We revisit existing security proofs for key-alternating ciphers with a single permutation (KACSPs), a...
-
Chapter and Conference Paper
MCVDSSE: Secure Multi-client Verifiable Dynamic Symmetric Searchable Encryption
Existing multi-user dynamic symmetric searchable encryptions (DSSE) schemes unreasonably require private key sharing or require data owners to stay online. And existing verifiable DSSE is mostly based on publi...
-
Chapter and Conference Paper
SVFL: Secure Vertical Federated Learning on Linear Models
Federated learning (FL) is a popular technique that enables multiple parties to train a machine learning model collaboratively without disclosing the raw data to each other. A vertically partitioned federated ...
-
Chapter and Conference Paper
Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning
As the most popular consensus algorithm for blockchain, the Proof-of-Work (PoW) is suffering from the inability of handling computing power fluctuations. Meanwhile, PoW consumes a significant amount of energy ...
-
Article
A survey on cryptographic techniques for protecting big data security: present and forthcoming
Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world. As they significantly create economic and social value, big data meaningfull...
-
Chapter and Conference Paper
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption
Gordon et al. (TCC 2015) systematically studied the security of Multi-client Verifiable Computation (MVC), in which a set of computationally-weak clients outsource the computation of a general function f over the...
-
Article
A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid
Incorporation of fog computing with low latency, preprocession (e.g., data aggregation) and location awareness, can facilitate fine-grained collection of smart metering data in smart grid and promotes the sust...
-
Article
Open AccessDesignated server-aided revocable identity-based keyword search on lattice
Public key encryption scheme with keyword search is a promising technique supporting search on encrypted data without leaking any information about the keyword. In real applications, it’s critical to find an e...
-
Article
Extended Galbraith’s test on the anonymity of IBE schemes from higher residuosity
At PKC 2019, Clear and McGoldrick presented the first identity-based encryption (IBE) scheme that is group homomorphic for addition modulo a poly-sized prime e. Assuming that deciding solvability of a special sys...
-
Chapter and Conference Paper
Tight Security Analysis of 3-Round Key-Alternating Cipher with a Single Permutation
The tight security bound of the KAC (Key-Alternating Cipher) construction whose round permutations are independent from each other has been well studied. Then a natural question is how the security bound will ...
-
Chapter and Conference Paper
New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol
The e-th power residue symbol \(\left( \frac{\alpha }{\mathfrak {p}}\right) _e\) is a useful mathematical tool in cry...
-
Chapter and Conference Paper
Anonymous IBE from Quadratic Residuosity with Fast Encryption
We develop two variants of Cocks’ identity-based encryption. One variant has faster encryption, where the most time-consuming part only requires several modular multiplications. The other variant makes the fir...
-
Article
Smart contract for secure billing in ride-hailing service via blockchain
Ride-hailing service is gaining an increasing popularity due to its great advantages on fare estimation, automatic payments, and reputation ratings. However, how to build the trust between the driver and the p...
-
Article
Secure key-aggregation authorized searchable encryption
-
Chapter and Conference Paper
Efficient White-Box Traceable ABE for Vehicular Networks
With rapid development and wide application of vehicular networks, data security is gradually valued. CP-ABE could be adopted based on the characteristics of vehicular networks data transmission. And short dec...
-
Chapter and Conference Paper
Efficient Collision Attack Frameworks for RIPEMD-160
RIPEMD-160 is an ISO/IEC standard and has been applied to generate the Bitcoin address with SHA-256. Due to the complex dual-stream structure, the first collision attack on reduced RIPEMD-160 presented by Liu,...
-
Chapter and Conference Paper
SDKSE-KGA: A Secure Dynamic Keyword Searchable Encryption Scheme Against Keyword Guessing Attacks
A number of searchable encryption schemes have been widely proposed to solve the search problem in ciphertext domain. However, most existing searchable encryption schemes are vulnerable to keyword guessing at...