Online/offline MA-CP-ABE with cryptographic reverse firewalls for IoT
J Li, Y Fan, X Bian, Q Yuan - Entropy, 2023 - mdpi.com
Devices in the Internet of Things (IoT) usually use cloud storage and cloud computing to
save storage and computing cost. Therefore, the efficient realization of one-to-many …
save storage and computing cost. Therefore, the efficient realization of one-to-many …
SR-PEKS: Subversion-resistant public key encryption with keyword search
Public key encryption with keyword search (PEKS) provides secure searchable data
encryption in cloud storage. Users can outsource encrypted data and keywords to a cloud …
encryption in cloud storage. Users can outsource encrypted data and keywords to a cloud …
Subversion-resistant and consistent attribute-based keyword search for secure cloud storage
Secure cloud search service allows resource-constrained clients to effectively search over
encrypted cloud storage. Towards enabling owner-enforced search authorization, the notion …
encrypted cloud storage. Towards enabling owner-enforced search authorization, the notion …
Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks
The wireless body area network (WBAN) provides users with real-time medical services.
Meanwhile, the cloud technology provides greater storage space and computing power for …
Meanwhile, the cloud technology provides greater storage space and computing power for …
Generic semantic security against a kleptographic adversary
Notable recent security incidents have generated intense interest in adversaries which
attempt to subvert---perhaps covertly---crypto\-graphic algorithms. In this paper we develop …
attempt to subvert---perhaps covertly---crypto\-graphic algorithms. In this paper we develop …
Searchable public-key encryption with cryptographic reverse firewalls for cloud storage
In order to protect data privacy in cloud storage, sensitive data is encrypted before being
uploaded to a cloud server. How to retrieve ciphertext safely and effectively has become a …
uploaded to a cloud server. How to retrieve ciphertext safely and effectively has become a …
Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption
Motivated by the currently widespread concern about mass surveillance of encrypted
communications, Bellare et al. introduced at CRYPTO 2014 the notion of Algorithm …
communications, Bellare et al. introduced at CRYPTO 2014 the notion of Algorithm …
Practical algorithm substitution attacks on real-world public-key cryptosystems
H Jiang, J Han, Z Zhang, Z Ma… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The revelations about massive surveillance have created significant interest in algorithm
substitution attack (ASA), where an honest implementation of a cryptographic primitive is …
substitution attack (ASA), where an honest implementation of a cryptographic primitive is …
Let a non-barking watchdog bite: Cliptographic signatures with an offline watchdog
We study how to construct secure digital signature schemes in the presence of kleptographic
attacks. Our work utilizes an offline watchdog to clip the power of subversions via only one …
attacks. Our work utilizes an offline watchdog to clip the power of subversions via only one …
Concessive online/offline attribute based encryption with cryptographic reverse firewalls—Secure and efficient fine-grained access control on corrupted machines
Attribute based encryption (ABE) has potential to be applied in various cloud computing
applications. However, the Snowden revelations show that powerful adversaries can corrupt …
applications. However, the Snowden revelations show that powerful adversaries can corrupt …