Online/offline MA-CP-ABE with cryptographic reverse firewalls for IoT

J Li, Y Fan, X Bian, Q Yuan - Entropy, 2023‏ - mdpi.com
Devices in the Internet of Things (IoT) usually use cloud storage and cloud computing to
save storage and computing cost. Therefore, the efficient realization of one-to-many …

SR-PEKS: Subversion-resistant public key encryption with keyword search

C Jiang, C Xu, Z Zhang, K Chen - IEEE Transactions on Cloud …, 2023‏ - ieeexplore.ieee.org
Public key encryption with keyword search (PEKS) provides secure searchable data
encryption in cloud storage. Users can outsource encrypted data and keywords to a cloud …

Subversion-resistant and consistent attribute-based keyword search for secure cloud storage

K Zhang, Z Jiang, J Ning… - IEEE Transactions on …, 2022‏ - ieeexplore.ieee.org
Secure cloud search service allows resource-constrained clients to effectively search over
encrypted cloud storage. Towards enabling owner-enforced search authorization, the notion …

Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks

Y Zhou, L Zhao, Y **, F Li - Information Sciences, 2022‏ - Elsevier
The wireless body area network (WBAN) provides users with real-time medical services.
Meanwhile, the cloud technology provides greater storage space and computing power for …

Generic semantic security against a kleptographic adversary

A Russell, Q Tang, M Yung, HS Zhou - Proceedings of the 2017 ACM …, 2017‏ - dl.acm.org
Notable recent security incidents have generated intense interest in adversaries which
attempt to subvert---perhaps covertly---crypto\-graphic algorithms. In this paper we develop …

Searchable public-key encryption with cryptographic reverse firewalls for cloud storage

Y Zhou, Z Hu, F Li - IEEE Transactions on Cloud Computing, 2021‏ - ieeexplore.ieee.org
In order to protect data privacy in cloud storage, sensitive data is encrypted before being
uploaded to a cloud server. How to retrieve ciphertext safely and effectively has become a …

Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption

R Chen, X Huang, M Yung - … 2020: 26th International Conference on the …, 2020‏ - Springer
Motivated by the currently widespread concern about mass surveillance of encrypted
communications, Bellare et al. introduced at CRYPTO 2014 the notion of Algorithm …

Practical algorithm substitution attacks on real-world public-key cryptosystems

H Jiang, J Han, Z Zhang, Z Ma… - IEEE Transactions on …, 2023‏ - ieeexplore.ieee.org
The revelations about massive surveillance have created significant interest in algorithm
substitution attack (ASA), where an honest implementation of a cryptographic primitive is …

Let a non-barking watchdog bite: Cliptographic signatures with an offline watchdog

SSM Chow, A Russell, Q Tang, M Yung, Y Zhao… - … Workshop on Public …, 2019‏ - Springer
We study how to construct secure digital signature schemes in the presence of kleptographic
attacks. Our work utilizes an offline watchdog to clip the power of subversions via only one …

Concessive online/offline attribute based encryption with cryptographic reverse firewalls—Secure and efficient fine-grained access control on corrupted machines

H Ma, R Zhang, G Yang, Z Song, S Sun… - Computer Security: 23rd …, 2018‏ - Springer
Attribute based encryption (ABE) has potential to be applied in various cloud computing
applications. However, the Snowden revelations show that powerful adversaries can corrupt …