Blockchain-aware rollbackable data access control for iot-enabled digital twin

S Qi, X Yang, J Yu, Y Qi - IEEE Journal on Selected Areas in …, 2023 - ieeexplore.ieee.org
The rapid development of Internet of Things (IoT) enables digital twin (DT) technology to
precisely represent a real product in a virtual space by generating a multitude of IoT data …

Tweaking even-mansour ciphers

B Cogliati, R Lampe, Y Seurin - … , Santa Barbara, CA, USA, August 16-20 …, 2015 - Springer
We study how to construct efficient tweakable block ciphers in the Random Permutation
model, where all parties have access to public random permutation oracles. We propose a …

Secure data deduplication with dynamic access control for mobile cloud storage

S Qi, W Wei, J Wang, S Sun… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Data deduplication is of vital importance for mobile cloud computing to cope with the
explosive growth of outsourced mobile data. In order to ensure the privacy of sensitive …

Mix&Slice: Efficient access revocation in the cloud

E Bacis, S De Capitani di Vimercati, S Foresti… - Proceedings of the …, 2016 - dl.acm.org
We present an approach to enforce access revocation on resources stored at external cloud
providers. The approach relies on a resource transformation that provides strong mutual …

On the provable security of the iterated Even-Mansour cipher against related-key and chosen-key attacks

B Cogliati, Y Seurin - Annual International Conference on the Theory and …, 2015 - Springer
Abstract The iterated Even-Mansour cipher is a construction of a block cipher from r public
permutations P_1, ..., P_r which abstracts in a generic way the structure of key-alternating …

Performance comparison between deep learning-based and conventional cryptographic distinguishers

E Bellini, M Rossi - Intelligent Computing: Proceedings of the 2021 …, 2021 - Springer
While many similarities between Machine Learning and cryptanalysis tasks exists, so far no
major result in cryptanalysis has been reached with the aid of Machine Learning techniques …

XPX: generalized tweakable even-mansour with improved security guarantees

B Mennink - Annual International Cryptology Conference, 2016 - Springer
We present XPX, a tweakable blockcipher based on a single permutation P. On input of a
tweak (t_ 11, t_ 12, t_ 21, t_ 22) ∈ T and a message m, it outputs ciphertext c= P (m …

Indifferentiability of iterated Even-Mansour ciphers with non-idealized key-schedules: Five rounds are necessary and sufficient

Y Dai, Y Seurin, J Steinberger… - Advances in Cryptology …, 2017 - Springer
We prove that the 5-round iterated Even-Mansour (IEM) construction with a non-idealized
key-schedule (such as the trivial key-schedule, where all round keys are equal) is …

Mix&Slice for efficient access revocation on outsourced data

E Bacis, SDC di Vimercati, S Foresti… - … on Dependable and …, 2023 - ieeexplore.ieee.org
A complex problem when outsourcing data to the cloud is access control management.
Encryption, by wrap** data with a self-enforcing protection layer, provides access control …

A quantum related-key attack based on the Bernstein–Vazirani algorithm

H **e, L Yang - Quantum Information Processing, 2020 - Springer
Due to the powerful computing capability of quantum computers, cryptographic researchers
have applied quantum algorithms to cryptanalysis and obtained many interesting results in …