Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms,...
Data publish-subscribe service is an effective approach to share and filter data. Due to the huge volume and velocity of data generated daily, cloud systems are inevitably becoming the platform for...
View ArticleA Comprehensive Comparison of Shannon Entropy and Smooth Renyi Entropy, by...
We provide a new result that links two crucial entropy notions: Shannon entropy $\mathrm{H}_1$ and collision entropy $\mathrm{H}_2$. Our formula gives the \emph{worst possible} amount of collision...
View ArticleAttacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID...
Sundaresan et al proposed recently a novel ownership transfer protocol for multi-tag multi-owner RFID environments that complies with the EPC Class1 Generation2 standard. The authors claim that this...
View ArticlePrivacy-Preserving Face Recognition with Outsourced Computation, by Can Xiang...
Face recognition is one of the most important biometrics pattern recognitions, which has been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of biometrics data...
View ArticleJackpot Stealing Information From Large Caches via Huge Pages, by Gorka...
The cloud computing infrastructure relies on virtualized servers that provide isolation across guest OS's through sandboxing. This isolation was demonstrated to be imperfect in past work whichexploited...
View ArticleKey recovery attacks on Grain family using BSW sampling and certain...
A novel internal state recovery attack on the whole Grain family of ciphers is proposed in this work. It basically uses the ideas of BSW sampling along with employing a weak placement of the tap...
View ArticleA Chinese Remainder Theorem Approach to Bit-Parallel GF(2^n) Polynomial Basis...
We show that the step "modulo the degree-n field generating irreducible polynomial" in the classical definition of the GF(2^n) multiplication operation can be avoided. This leads to an alternative...
View ArticleGeneric Constructions of Integrated PKE and PEKS, by Yu Chen and Jiang Zhang...
In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encryption with keyword search (PEKS) schemes (PKE-PEKS as shorthand). We first formalize the strongest...
View ArticleNew Constructions of Revocable Identity-Based Encryption from Multilinear...
A revocation mechanism in cryptosystems for a large number of users is absolutely necessary to maintain the security of whole systems. A revocable identity-based encryption (RIBE) provides an efficient...
View ArticleKey Derivation From Noisy Sources With More Errors Than Entropy, by Ran...
Fuzzy extractors (Dodis et al., Eurocrypt 2004) convert repeated noisy readings of a high-entropy secret into the same uniformly distributed key. To eliminate noise, they require an initial enrollment...
View ArticlePublicly Evaluable Pseudorandom Functions and Their Applications, by Yu Chen...
We put forth the notion of publicly evaluable pseudorandom functions (PEPRFs), which is a non-trivial extension of the standard pseudorandom functions (PRFs). Briefly, PEPRFs are defined over domain...
View ArticleSakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited...
Identity-based non-interactive key exchange (IB-NIKE) is a powerful but a bit overlooked primitive in identity-based cryptography. While identity-based encryption and signature have been extensively...
View ArticleImproved Linear Cryptanalysis of Reduced-round SIMON, by Mohamed Ahmed...
SIMON is a family of ten lightweight block ciphers published by Beaulieu et al.\ from U.S. National Security Agency (NSA). In this paper we investigate the security of SIMON against different variants...
View ArticleAutomatic Enumeration of (Related-key) Differential and Linear...
In this paper, we investigate the Mixed-integer Linear Programming (MILP) modelling of the differential and linear behavior of a wide rang of block ciphers. The differential and linear behavior of the...
View ArticleImproved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON, by...
SIMON is a family of lightweight block ciphers designed by the U.S. National Security Agency (NSA) that has attracted much attention since its publication in 2013. In this paper, we thoroughly...
View ArticleNon-Linearity and Affine Equivalence of Permutations, by P R Mishra, Indivar...
In this paper we consider permutations on n symbols as bijections on Z/nZ. Treating permutations this way facilitates us with additional structures such as group, ring defined in the set Z/nZ. We...
View ArticleCryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers,...
Shortly following Cheon, Han, Lee, Ryu and Stehle attack against the multilinear map of Coron, Lepoint and Tibouchi (CLT), two independent approaches to thwart this attack have been proposed on the...
View ArticleGeppetto: Versatile Verifiable Computation, by Craig Costello and Cédric...
Cloud computing sparked interest in Verifiable Computation protocols, which allow a weak client to securely outsource computations to remote parties. Recent work has dramatically reduced the client's...
View ArticleSecure Lightweight Entity Authentication with Strong PUFs: Mission Impossible...
Physically unclonable functions (PUFs) exploit the unavoidable manufacturing variations of an integrated circuit (IC). Their input-output behavior serves as a unique IC 'fingerprint'. Therefore, they...
View ArticleA New Method for Decomposition in the Jacobian of Small Genus Hyperelliptic...
Decomposing a divisor over a suitable factor basis in the Jacobian of a hyperelliptic curve is a crucial step in an index calculus algorithm for the discrete log problem in the Jacobian. For small...
View Article