4.7 Article

Designated-server identity-based authenticated encryption with keyword search for encrypted emails

Journal

INFORMATION SCIENCES
Volume 481, Issue -, Pages 330-343

Publisher

ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2019.01.004

Keywords

Keyword search; Encrypted email system; Public key encryption; identity based encryption; Inside keyword guessing attacks

Funding

  1. National Natural Science Foundation of China [61872152, 61472146]
  2. Guangdong Natural Science Funds for Distinguished Young Scholar [2014A030306021]
  3. Guangdong Program for Special Support of Top-notch Young Professionals [2015TQ01X796]
  4. Pearl River Nova Program of Guangzhou [201610010037]
  5. Graduate Student Overseas Study Program of South China Agricultural University [2018LHPY025]

Ask authors/readers for more resources

In encrypted email system, how to search over encrypted cloud emails without decryption is an important and practical problem. Public key encryption with keyword search (PEKS) is an efficient solution to it. However, PEKS suffers from the complex key management problem in the public key infrastructure. Its variant in the identity-based setting addresses the drawback, however, almost all the schemes does not resist against offline keyword guessing attacks (KGA) by inside adversaries. In this work we introduce the notion of designated-server identity-based authenticated encryption with keyword search (dIBAEKS), in which the email sender authenticates the message while encrypting so that no adversary including the server can launch offline KGA. Furthermore, we strengthen the security requirement so that only the designated server has the capability to search over encrypted emails for receivers. We formally define dIBAEKS and its security models, and propose two dIBAEKS constructions using Type-I and Type-III bilinear pairing, respectively. We compare our schemes with some related IBEKS schemes in the literature, and do experiments to demonstrate its efficiency. Although they are slightly less computationally efficient than but still comparable with the related schemes, our schemes provide stronger security guarantee and better protect users' privacy. (C) 2019 Elsevier Inc. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Theory & Methods

Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search

Hongbo Li, Qiong Huang, Jianye Huang, Willy Susilo

Summary: To improve the quality of medical care and reduce unnecessary medical errors, electronic medical records (EMRs) are widely applied in hospital information systems. However, the increasing EMRs bring heavy storage burden to hospitals. Cloud server can save the hospital local storage and realize EMRs sharing among external researchers. This paper proposes a secure and efficient cloud storing and sharing method called PAUKS.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Hardware & Architecture

Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing

Shijin Chen, Willy Susilo, Yudi Zhang, Bo Yang, Mingwu Zhang

Summary: This paper proposes a flexible mechanism to provide privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing. It ensures the privacy of sensing data and anomaly counting results for data providers and requesters.

COMPUTER STANDARDS & INTERFACES (2023)

Article Computer Science, Information Systems

Towards secure asynchronous messaging with forward secrecy and mutual authentication

Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Willy Susilo, Ilsun You

Summary: This paper focuses on zero round-trip time (0-RTT) key exchange protocols and introduces a new cryptographic primitive called puncturable identity-based matchmaking key encapsulation mechanism (PIB-MKEM). Based on PIB-MKEM, a generic 0-RTT key exchange protocol with forward secrecy, mutual authentication, and replay resistance is proposed. The implementation of PIB-MKEM is also provided with extensive evaluations.

INFORMATION SCIENCES (2023)

Article Computer Science, Information Systems

Secure access privilege delegation using attribute-based encryption

Suryakanta Panda, Samrat Mondal, Ashok Kumar Das, Willy Susilo

Summary: Attribute-based encryption (ABE) is widely used for secure and efficient data sharing. However, ABE faces challenges in applications that require collaboration among data users due to its fixed access policy. This work introduces a proxy re-encryption mechanism to address this issue and has formally proven the security of the proposed system. Revocation of delegation rights is also demonstrated in the proposed system.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2023)

Article Computer Science, Information Systems

Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security

Jingwei Lu, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, Qiong Huang

Summary: Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplify data management. Certificateless public key authenticated encryption with keyword search (CLPAEKS) is a variant of PEKS that simplifies certificate management and resists keyword guessing attacks. This paper proposes an improved security model and a new CLPAEKS scheme that is secure under the improved security model based on the intractability of the DBDH problem and the DDH problem.

INFORMATION (2023)

Article Computer Science, Information Systems

DFE-IP: Delegatable functional encryption for inner product

Jinguang Han, Liqun Chen, Willy Susilo, Liquan Chen, Ge Wu

Summary: This paper proposes a delegatable FE-IP (DFE-IP) scheme which supports decryption delegation when authorized users are unavailable to access the system, without requiring re-encryption of ciphertexts. It also provides temporary delegation and flexible revocation.

INFORMATION SCIENCES (2023)

Proceedings Paper Computer Science, Artificial Intelligence

CASSOCK: Viable Backdoor Attacks against DNN in the Wall of Source-Specific Backdoor Defenses

Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang, Yuqing Zhang, Willy Susilo, Dongxi Liu

Summary: This study proposes a new class of viable source-specific backdoor attacks called CASSOCK, which improves the attack performance of existing source-specific backdoor attacks by designing triggers with heterogeneous transparency to craft poisoned and cover datasets.

PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023 (2023)

Proceedings Paper Computer Science, Information Systems

TrojanModel: A Practical Trojan Attack against Automatic Speech Recognition Systems

Wei Zong, Yang-Wai Chow, Willy Susilo, Kien Do, Svetha Venkatesh

Summary: This paper presents TrojanModel, a practical Trojan attack against Automatic Speech Recognition (ASR) systems, which achieves high attack success rates using unsuspicious sounds as triggers, such as background music, without requiring retraining of the target model.

2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP (2023)

Article Computer Science, Theory & Methods

Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits

Xueqiao Liu, Guomin Yang, Willy Susilo, Kai He, Robert H. Deng, Jian Weng

Summary: This paper proposes a computation framework for protecting sensitive data privacy, which can be applied to computation tasks with multiple input sources and/or multiple output recipients. The framework ensures privacy for the entire computation process and supports basic operations in Boolean circuits. In addition, it presents a privacy-preserving Bloom Filter and a multi-keyword searchable encryption scheme based on the proposed framework.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Hardware & Architecture

Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property

Abderrahmane Nitaj, Willy Susilo, Joseph Tonien

Summary: This paper investigates a specific family of enhanced substitution boxes for the Advanced Encryption Standard. These modified S-boxes have the maximal periodicity property, with each input having the maximum orbit length of 256. The parameters for achieving this maximal periodicity property are completely determined. The new enhanced S-boxes also exhibit improved bit avalanche property.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

VRBC: A Verifiable Redactable Blockchain With Efficient Query and Integrity Auditing

Guohua Tian, Jianghong Wei, Miroslaw Kutylowski, Willy Susilo, Xinyi Huang, Xiaofeng Chen

Summary: This paper introduces the concept of verifiable redactable blockchain (VRBC) and proposes a novel authentication data structure and an efficient VRBC scheme to achieve efficient validity verification and consistent blockchain ledger. Optimized strategies are introduced and the scheme is extended to transaction-level and permissionless VRBC. Finally, the feasibility of the proposed scheme is demonstrated through security analysis and performance evaluation.

IEEE TRANSACTIONS ON COMPUTERS (2023)

Article Computer Science, Theory & Methods

Verifiable and Redactable Blockchains With Fully Editing Operations

Jun Shen, Xiaofeng Chen, Zheli Liu, Willy Susilo

Summary: Blockchain technology has been praised for its immutability, but it is desired to make blockchains mutable to comply with legal and moral restrictions. We propose a verifiable and redactable blockchain for the first time, allowing fully editing operations while ensuring the verifiability of the blockchain state. Our approach utilizes a double trapdoor chameleon hash family for computationally efficient and key-exposure resistant block editing, and combines trapdoorless universal accumulators and the largest sequence number principle for blockchain state verification. We provide comprehensive analysis and extensive experiments to demonstrate the security and feasibility of our proposed redactable blockchain.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Hardware & Architecture

Abuse-resistant deniable encryption

Yanmei Cao, Jianghong Wei, Yang Xiang, Willy Susilo, Xiaofeng Chen

Summary: Deniable encryption (DE) allows private communication even when adversaries force participants to reveal their secret keys. However, existing DE systems do not consider potential abuse by malicious users. This paper proposes an abuse-resistant DE scheme and provides formal definitions and security analysis. The proposed scheme outperforms existing work in terms of functionality and ciphertext rate.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Post-quantum secure group signature with verifier local revocation and backward unlinkability

Shuaining Gao, Xinjian Chen, Hongbo Li, Willy Susilo, Qiong Huang

Summary: This paper proposes a new lattice-based group signature scheme that combines the timestamp with Verifier Local Revocation (VLR) using the complete tree technique. The scheme achieves post-quantum security, almost full anonymity, and traceability, as well as backward unlinkability and effectively reduces the size of the revocation list.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Information Systems

A consensus model considers managing manipulative and overconfident behaviours in large-scale group decision-making

Xia Liang, Jie Guo, Peide Liu

Summary: This paper investigates a novel consensus model based on social networks to manage manipulative and overconfident behaviors in large-scale group decision-making. By proposing a novel clustering model and improved methods, the consensus reaching is effectively facilitated. The feedback mechanism and management approach are employed to handle decision makers' behaviors. Simulation experiments and comparative analysis demonstrate the effectiveness of the model.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

CGN: Class gradient network for the construction of adversarial samples

Xiang Li, Haiwang Guo, Xinyang Deng, Wen Jiang

Summary: This paper proposes a method based on class gradient networks for generating high-quality adversarial samples. By introducing a high-level class gradient matrix and combining classification loss and perturbation loss, the method demonstrates superiority in the transferability of adversarial samples on targeted attacks.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Distinguishing latent interaction types from implicit feedbacks for recommendation

Lingyun Lu, Bang Wang, Zizhuo Zhang, Shenghao Liu

Summary: Many recommendation algorithms only rely on implicit feedbacks due to privacy concerns. However, the encoding of interaction types is often ignored. This paper proposes a relation-aware neural model that classifies implicit feedbacks by encoding edges, thereby enhancing recommendation performance.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Proximity-based density description with regularized reconstruction algorithm for anomaly detection

Jaehong Yu, Hyungrok Do

Summary: This study discusses unsupervised anomaly detection using one-class classification, which determines whether a new instance belongs to the target class by constructing a decision boundary. The proposed method uses a proximity-based density description and a regularized reconstruction algorithm to overcome the limitations of existing one-class classification methods. Experimental results demonstrate the superior performance of the proposed algorithm.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Non-iterative border-peeling clustering algorithm based on swap strategy

Hui Tu, Shifei Ding, Xiao Xu, Haiwei Hou, Chao Li, Ling Ding

Summary: Border-Peeling algorithm is a density-based clustering algorithm, but its complexity and issues on unbalanced datasets restrict its application. This paper proposes a non-iterative border-peeling clustering algorithm, which improves the clustering performance by distinguishing and associating core points and border points.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

A two-stage denoising framework for zero-shot learning with noisy labels

Long Tang, Pan Zhao, Zhigeng Pan, Xingxing Duan, Panos M. Pardalos

Summary: In this work, a two-stage denoising framework (TSDF) is proposed for zero-shot learning (ZSL) to address the issue of noisy labels. The framework includes a tailored loss function to remove suspected noisy-label instances and a ramp-style loss function to reduce the negative impact of remaining noisy labels. In addition, a dynamic screening strategy (DSS) is developed to efficiently handle the nonconvexity of the ramp-style loss.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Selection of a viable blockchain service provider for data management within the internet of medical things: An MCDM approach to Indian healthcare

Raghunathan Krishankumar, Sundararajan Dhruva, Kattur S. Ravichandran, Samarjit Kar

Summary: Health 4.0 is gaining global attention for better healthcare through digital technologies. This study proposes a new decision-making framework for selecting viable blockchain service providers in the Internet of Medical Things (IoMT). The framework addresses the limitations in previous studies and demonstrates its applicability in the Indian healthcare sector. The results show the top ranking BSPs, the importance of various criteria, and the effectiveness of the developed model.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Q-learning with heterogeneous update strategy

Tao Tan, Hong Xie, Liang Feng

Summary: This paper proposes a heterogeneous update idea and designs HetUp Q-learning algorithm to enlarge the normalized gap by overestimating the Q-value corresponding to the optimal action and underestimating the Q-value corresponding to the other actions. To address the limitation, a softmax strategy is applied to estimate the optimal action, resulting in HetUpSoft Q-learning and HetUpSoft DQN. Extensive experimental results show significant improvements over SOTA baselines.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Dyformer: A dynamic transformer-based architecture for multivariate time series classification

Chao Yang, Xianzhi Wang, Lina Yao, Guodong Long, Guandong Xu

Summary: This paper proposes a dynamic transformer-based architecture called Dyformer for multivariate time series classification. Dyformer captures multi-scale features through hierarchical pooling and adaptive learning strategies, and improves model performance by introducing feature-map-wise attention mechanisms and a joint loss function.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

ESSENT: an arithmetic optimization algorithm with enhanced scatter search strategy for automated test case generation

Xiguang Li, Baolu Feng, Yunhe Sun, Ammar Hawbani, Saeed Hammod Alsamhi, Liang Zhao

Summary: This paper proposes an enhanced scatter search strategy, using opposition-based learning, to solve the problem of automated test case generation based on path coverage (ATCG-PC). The proposed ESSENT algorithm selects the path with the lowest path entropy among the uncovered paths as the target path and generates new test cases to cover the target path by modifying the dimensions of existing test cases. Experimental results show that the ESSENT algorithm outperforms other state-of-the-art algorithms, achieving maximum path coverage with fewer test cases.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

An attention based approach for automated account linkage in federated identity management

Shirin Dabbaghi Varnosfaderani, Piotr Kasprzak, Aytaj Badirova, Ralph Krimmel, Christof Pohl, Ramin Yahyapour

Summary: Linking digital accounts belonging to the same user is crucial for security, user satisfaction, and next-generation service development. However, research on account linkage is mainly focused on social networks, and there is a lack of studies in other domains. To address this, we propose SmartSSO, a framework that automates the account linkage process by analyzing user routines and behavior during login processes. Our experiments on a large dataset show that SmartSSO achieves over 98% accuracy in hit-precision.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

A memetic algorithm with fuzzy-based population control for the joint order batching and picker routing problem

Renchao Wu, Jianjun He, Xin Li, Zuguo Chen

Summary: This paper proposes a memetic algorithm with fuzzy-based population control (MA-FPC) to solve the joint order batching and picker routing problem (JOBPRP). The algorithm incorporates batch exchange crossover and a two-level local improvement procedure. Experimental results show that MA-FPC outperforms existing algorithms in terms of solution quality.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

Refining one-class representation: A unified transformer for unsupervised time-series anomaly detection

Guoxiang Zhong, Fagui Liu, Jun Jiang, Bin Wang, C. L. Philip Chen

Summary: In this study, we propose the AMFormer framework to address the problem of mixed normal and anomaly samples in deep unsupervised time-series anomaly detection. By refining the one-class representation and introducing the masked operation mechanism and cost sensitive learning theory, our approach significantly improves anomaly detection performance.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

A data-driven optimisation method for a class of problems with redundant variables and indefinite objective functions

Jin Zhou, Kang Zhou, Gexiang Zhang, Ferrante Neri, Wangyang Shen, Weiping Jin

Summary: In this paper, the authors focus on the issue of multi-objective optimisation problems with redundant variables and indefinite objective functions (MOPRVIF) in practical problem-solving. They propose a dual data-driven method for solving this problem, which consists of eliminating redundant variables, constructing objective functions, selecting evolution operators, and using a multi-objective evolutionary algorithm. The experiments conducted on two different problem domains demonstrate the effectiveness, practicality, and scalability of the proposed method.

INFORMATION SCIENCES (2024)

Article Computer Science, Information Systems

A Monte Carlo fuzzy logistic regression framework against imbalance and separation

Georgios Charizanos, Haydar Demirhan, Duygu Icen

Summary: This article proposes a new fuzzy logistic regression framework that addresses the problems of separation and imbalance while maintaining the interpretability of classical logistic regression. By fuzzifying binary variables and classifying subjects based on a fuzzy threshold, the framework demonstrates superior performance on imbalanced datasets.

INFORMATION SCIENCES (2024)