Article
Computer Science, Information Systems
Li Su, Huizheng Geng, Sixu Guo, Shen He
Summary: This study proposes a secure two-party euclidean distance computation (SEDC) scheme based on Paillier encryption under a covert adversarial model. The scheme computes the secure two-party Euclidean distance using technologies such as Paillier encryption, and verifies the computation results to ensure data authenticity and no cheating during parameter interaction. The scheme is shown to be correct, confidential, and unforgeable under chosen-plaintext attack. Scheme comparison and efficiency analysis demonstrate that the scheme achieves a balance in the security model and is highly applicable due to its low communication and time complexity.
Article
Computer Science, Information Systems
Raine Nieminen, Kimmo Jarvinen
Summary: The proposed privacy-preserving indoor localization scheme uses received signal strength measurements from WiFi access points and secure two-party computation with cryptographic primitives to protect privacy. Optimizations reduce computation and communication overheads, and a proof-of-concept implementation on Android smartphones demonstrates practical feasibility for certain indoor localization applications.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2021)
Article
Optics
Peng Huang, Qiuheng Song, Hekuo Peng, Jingwei Huang, Hongyan Wu, Qian Xiao, Bo Jia
Summary: The study proposes a SKGD scheme based on the polarization properties of optical fibers, with high key generation rate and low error rate. The system demonstrates high security due to the invisibility of the key signal and the technical difficulty of key sequence recovery.
Article
Computer Science, Information Systems
Oladayo Olufemi Olakanmi, Kehinde Oluwasesan Odeyemi
Summary: This paper presents a secure privacy-preserving offloading scheme based on modified secret sharing for multi-party computation in IoT. The scheme is capable of fair computation offloading, privacy protection, result verification, and low overhead. Incentive and trust models are also developed to encourage honesty, willingness, and discourage delay among workers.
INTERNET OF THINGS
(2022)
Article
Computer Science, Hardware & Architecture
Saeid Esmaeilzade, Nasrollah Pakniat, Ziba Eslami
Summary: The paper discusses the importance of oblivious transfer in cryptography and proposes a generic construction based on asymmetric homomorphic encryption for building simple and efficient oblivious transfer protocols. The construction is instantiated with well-known homomorphic encryption schemes such as RSA, Paillier, and NTRU, and its security is further proven in the universal composable framework.
JOURNAL OF SUPERCOMPUTING
(2022)
Article
Computer Science, Hardware & Architecture
Tasneem Ghunaim, Ibrahim Kamel, Zaher Al Aghbari
Summary: Cloud service providers offer virtual servers with powerful processors and large storage capacity at nominal fees. However, storing data on the cloud poses privacy risks, and user queries can be monitored by attackers and cloud operators.
JOURNAL OF SUPERCOMPUTING
(2023)
Article
Computer Science, Information Systems
Zhen Wang, Qiu-yu Zhang, Ling-tao Meng, Yi-lin Liu
Summary: This research suggests a searchable encryption and deep hashing-based secure image retrieval technique that extracts more expressive image features and constructs a secure, searchable encryption scheme. Experimental results demonstrate the system's robust security and precise retrieval, improving retrieval accuracy by at least 37% compared to traditional hashing schemes and saving retrieval time by at least 9.7% compared to the latest deep hashing schemes.
CMC-COMPUTERS MATERIALS & CONTINUA
(2023)
Article
Computer Science, Theory & Methods
Wenbo Zhang, Yayu Bai, Jingyu Feng
Summary: This paper proposes a blockchain-enabled Threat Intelligence Integrity Audit (TIIA) scheme for IIoT, which ensures the confidentiality protection requirements of threat intelligence on the blockchain and has high audit efficiency.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2022)
Article
Computer Science, Hardware & Architecture
Cong Zhao, Nan Guo, Tianhan Gao, Xinyang Deng, Jiayu Qi
Summary: This paper proposes an efficient privacy-preserving authentication scheme (PEPA) based on the Paillier cryptosystem to address the security and privacy issues in VANETs. The proposed scheme supports batch verification and allows users to interact without revealing sensitive information. Multiple authorities are used to reveal the identities of malicious users. System analysis and simulation show that PEPA achieves strong privacy-preserving authentication.
JOURNAL OF SYSTEMS ARCHITECTURE
(2023)
Article
Automation & Control Systems
Zahra Pooranian, Mohammad Shojafar, Sahil Garg, Rahim Taheri, Rahim Tafazolli
Summary: The article introduces the issues of data deduplication and encryption in Cloud envisioned cyber--physical systems (CCPS), and proposes a new encryption protocol LEVER to address this, which has high performance and practicality.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2021)
Article
Computer Science, Information Systems
Jing-Wen Zhang, Xiu-Bo Chen, Gang Xu, Heng-Ji Li, Ya-Lan Wang, Li-Hua Miao, Yi-Xian Yang
Summary: This paper proposes a novel secure multiparty quantum homomorphic encryption scheme that can complete arbitrary quantum computations on private data of multiple clients without decryption. The scheme utilizes quantum key distribution protocols and non-maximally entangled states to achieve secure homomorphic evaluation.
CMC-COMPUTERS MATERIALS & CONTINUA
(2022)
Article
Computer Science, Theory & Methods
Megan Chen, Jack Doerner, Yashvanth Kondi, Eysa Lee, Schuyler Rosefield, Abhi Shelat, Ran Cohen
Summary: In this paper, we present a new multiparty protocol for the distributed generation of biprime RSA moduli, with security against any subset of maliciously colluding parties. Our protocol is modular and introduces a combined sampling-and-sieving technique, along with an efficient, privacy-free check to improve security and efficiency.
JOURNAL OF CRYPTOLOGY
(2022)
Article
Quantum Science & Technology
Yinhong Cao
Summary: This article introduces a novel quantum protocol for quantum secure multi-party geometry computation, which provides unconditional security for Euclidean distance computation and can withstand various attacks.
QUANTUM INFORMATION PROCESSING
(2022)
Article
Engineering, Electrical & Electronic
Wen-Jie Liu, Zi-Xian Li
Summary: In this paper, a novel secure two-party quantum scalar product (S2QSP) protocol based on Fourier entangled states is proposed to achieve higher efficiency. The definition of unconditional security under malicious models is given, and an honesty verification method called Entanglement Bondage is proposed, which is used in conjunction with the modular summation gate to resist malicious attacks. The property of Fourier entangled states is used to calculate the scalar product with polynomial complexity. The unconditional security of our protocol is proved, which guarantees the privacy of all parties. Additionally, a privacy-preserving quantum matrix multiplication protocol based on S2QSP protocol is designed.
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS
(2023)
Article
Computer Science, Theory & Methods
Yehuda Lindell
Summary: The paper discusses the challenges in constructing efficient threshold signature protocols for ECDSA and introduces a new protocol that is significantly faster than existing ones. The new protocol shows good performance on standard machines, with security proven and partial concurrency achieved.
JOURNAL OF CRYPTOLOGY
(2021)