Skip to main content

previous disabled Page of 2
and
Your search also matched 77 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

EMPSI: Efficient multiparty private set intersection (with cardinality)

Include preview-only content
  1. Chapter and Conference Paper

    Tight Security Analysis of 3-Round Key-Alternating Cipher with a Single Permutation

    The tight security bound of the KAC (Key-Alternating Cipher) construction whose round permutations are independent from each other has been well studied. Then a natural question is how the security bound will ...

    Yusai Wu, Liqing Yu, Zhenfu Cao, **aolei Dong in Advances in Cryptology – ASIACRYPT 2020 (2020)

  2. Chapter and Conference Paper

    SDKSE-KGA: A Secure Dynamic Keyword Searchable Encryption Scheme Against Keyword Guessing Attacks

    A number of searchable encryption schemes have been widely proposed to solve the search problem in ciphertext domain. However, most existing searchable encryption schemes are vulnerable to keyword guessing at...

    Hongyuan Chen, Zhenfu Cao, **aolei Dong, Jiachen Shen in Trust Management XIII (2019)

  3. Chapter and Conference Paper

    Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation

    Ciphertext-policy attribute-based encryption (CP-ABE) is a promising primitive for enforcing access control policies defined by data owner on outsourced data. We propose a novel primitive called server-aided d...

    Gang Yu, **aoxiao Ma, Zhenfu Cao, Weihua Zhu in Information and Communications Security (2018)

  4. Chapter and Conference Paper

    PPOIM: Privacy-Preserving Shape Context Based Image Denoising and Matching with Efficient Outsourcing

    With the emerging techniques of wireless communication and cloud computing, large volumes of multimedia data are outsourced from resource constrained users to the cloud with abundant resource for both delegate...

    Meng Zheng, Jun Zhou, Zhenfu Cao, **aolei Dong in Information and Communications Security (2018)

  5. Chapter and Conference Paper

    Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption

    With highly development of cloud computing, data owners wish to outsource their data to clouds for computational and storage resource at a lower price. In order to protect the privacy of sensitive information,...

    Yunong Liang, Zhenfu Cao, **aolei Dong in Information and Communications Security (2018)

  6. Chapter and Conference Paper

    Extended Nested Dual System Groups, Revisited

    The notion of extended nested dual system groups (ENDSG) was recently proposed by Hofheinz et al. [PKC 2015] for constructing almost-tight identity based encryptions (IBE) in the multi-instance, multi-ciphertext ...

    Junqing Gong, Jie Chen, **aolei Dong, Zhenfu Cao in Public-Key Cryptography – PKC 2016 (2016)

  7. Chapter and Conference Paper

    Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting

    In 2015, Hofheinz et al. [PKC, 2015] extended Chen and Wee’s almost-tight reduction technique for identity based encryptions (IBE) [CRYPTO, 2013] to the multi-instance, multi-ciphertext (MIMC, or multi-challenge)...

    Junqing Gong, **aolei Dong, Jie Chen, Zhenfu Cao in Advances in Cryptology – ASIACRYPT 2016 (2016)

  8. Chapter and Conference Paper

    Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently

    Ciphertext-policy attribute-based encryption (CP-ABE) is a highly promising solution for cloud computing, which has been widely applied to provide fine-grained access control in cloud storage services recently...

    Jianting Ning, Zhenfu Cao, **aolei Dong, Junqing Gong in Computer Security – ESORICS 2016 (2016)

  9. Chapter and Conference Paper

    PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching

    Secure outsourced pattern matching permits both the sender and receiver with resource-constrained mobile devices to respectively delegate text T and pattern P to the cloud for the computationally-intensive task o...

    Jun Zhou, Zhenfu Cao, **aolei Dong in Computer Security – ESORICS 2016 (2016)

  10. Chapter and Conference Paper

    4P_VES: A Collusion-Resistant Accountable Virtual Economy System

    Virtual economy develops rapidly and accounts for quite a large proportion in the entire economy. Markets of virtual goods, such as games, apps and cloud services, are quite active and contribute a lot to the ...

    Hong Zhang, **aolei Dong, Zhenfu Cao in Information and Communications Security (2015)

  11. Chapter and Conference Paper

    Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud

    As a sophisticated mechanism for secure fine-grained access control, ciphertext-policy attribute-based encryption (CP-ABE) is a highly promising solution for commercial applications such as cloud computing. Ho...

    Jianting Ning, **aolei Dong, Zhenfu Cao, Lifei Wei in Computer Security -- ESORICS 2015 (2015)

  12. Chapter and Conference Paper

    Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability

    A Ciphertext-Policy Attribute-Based Encryption (CP-ABE) system extracts the decryption keys over attributes shared by multiple users. It brings plenty of advantages in ABE applications. CP-ABE enables fine-gra...

    Jianting Ning, Zhenfu Cao, **aolei Dong, Lifei Wei in Computer Security - ESORICS 2014 (2014)

  13. Chapter and Conference Paper

    All-but-One Dual Projective Hashing and Its Applications

    Recently, Wee (EUROCRYPT’12) introduced the notion of dual projective hashing as an extension of the Cramer-Shoup projective hashing, with a simple construction of lossy trapdoor functions, and a simple constr...

    Zongyang Zhang, Yu Chen, Sherman S. M. Chow in Applied Cryptography and Network Security (2014)

  14. Chapter and Conference Paper

    Identity-Based Extractable Hash Proofs and Their Applications

    In this paper, we introduce a general paradigm called identity-based extractable hash proof system (IB-EHPS), which is an extension of extractable hash proof system (EHPS) proposed by Wee (CRYPTO ’10). We show...

    Yu Chen, Zongyang Zhang, Dongdai Lin in Applied Cryptography and Network Security (2012)

  15. Chapter and Conference Paper

    Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles

    Recently Lewko and Waters proposed the first fully secure multi-authority ciphertext-policy attribute-based encryption (CP-ABE) system in the random oracle model, and leave the construction of a fully secure m...

    Zhen Liu, Zhenfu Cao, Qiong Huang, Duncan S. Wong in Computer Security – ESORICS 2011 (2011)

  16. Chapter and Conference Paper

    Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments

    When commitment schemes are used in complex environments, e.g., the Internet, the issue of malleability appears, i.e., a concurrent man-in-the-middle adversary might generate commitments to values related to o...

    Zhenfu Cao, Ivan Visconti, Zongyang Zhang in Public Key Cryptography – PKC 2010 (2010)

  17. Chapter and Conference Paper

    How to Construct Interval Encryption from Binary Tree Encryption

    In a broadcast encryption system with a total of n users, each user is assigned with a unique index i ∈ [1, n]. An encryptor can choose a receiver set S ⊆ [1, n] freely and encrypt a message for the recipients in...

    Huang Lin, Zhenfu Cao, **aohui Liang in Applied Cryptography and Network Security (2010)

  18. Chapter and Conference Paper

    Non-malleable Statistically Hiding Commitment from Any One-Way Function

    We give a construction of non-malleable statistically hiding commitments based on the existence of one-way functions. Our construction employs statistically hiding commitment schemes recently proposed by Haitn...

    Zongyang Zhang, Zhenfu Cao, Ning Ding, Rong Ma in Advances in Cryptology – ASIACRYPT 2009 (2009)

  19. Chapter and Conference Paper

    CCA-Secure Proxy Re-encryption without Pairings

    In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under Alice’s public key into another ciphertext that Bob can decrypt. However, the proxy cannot access the plaintext. Due to it...

    Jun Shao, Zhenfu Cao in Public Key Cryptography – PKC 2009 (2009)

  20. Chapter and Conference Paper

    Efficient Password-Based Authenticated Key Exchange Without Public Information

    Since the first password-based authenticated key exchange (PAKE) was proposed, it has enjoyed a considerable amount of interest from the cryptographic research community. To our best knowledge, most of propose...

    Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu in Computer Security – ESORICS 2007 (2007)

previous disabled Page of 2