Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2024
Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 3148–3163https://doi.org/10.1109/TIFS.2024.3361219Steganography is the technique of hiding secret messages within seemingly harmless covers to elude examination by censors. Despite having been proposed several decades ago, provably secure steganography has not gained popularity among researchers due to ...
- research-articleJanuary 2024
Zero-Value Filtering for Accelerating Non-Profiled Side-Channel Attack on Incomplete NTT-Based Implementations of Lattice-Based Cryptography
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 3353–3365https://doi.org/10.1109/TIFS.2024.3359890Lattice-based cryptographic schemes such as Crystals-Kyber and Dilithium are post-quantum algorithms selected to be standardized by NIST as they are considered to be secure against quantum computing attacks. The multiplication in polynomial rings is the ...
- research-articleJanuary 2024
Multiple Access Wiretap Channel With Partial Rate-Limited Feedback
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 3279–3294https://doi.org/10.1109/TIFS.2024.3359071This paper investigates the problem of secure transmission over a two-user discrete memoryless multiple-access wiretap channel with partial rate-limited feedback (MAC-WT-PLF). The receiver can causally and securely transmit feedback to one of the ...
- research-articleJanuary 2024
Polar Coding for Wiretap Channels With Random States Non-Causally Available at the Encoder
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 3324–3338https://doi.org/10.1109/TIFS.2024.3358992Channel state information (CSI) is differently available at each terminal in state-dependent wiretap channels (SD-WTCs). Considering a random channel state non-causally available only at the encoder, this paper investigates an explicit polar coding scheme ...
- research-articleJanuary 2024
Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2919–2934https://doi.org/10.1109/TIFS.2024.3357240Proxy re-encryption (PRE), as a promising cryptographic primitive for secure data sharing in clouds, has been widely studied for decades. PRE allows the proxies to use the re-encryption keys to convert ciphertexts computed under the delegator’s ...
-
- research-articleJanuary 2024
RIS-Assisted UAV Secure Communications With Artificial Noise-Aware Trajectory Design Against Multiple Colluding Curious Users
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 3064–3076https://doi.org/10.1109/TIFS.2024.3356166In this paper, we propose a secure unmanned aerial vehicle (UAV) communication system with the assistance of a reconfigurable intelligent surface (RIS), where the design of the UAV trajectory and artificial noise are incorporated to prevent eavesdropping ...
- research-articleJanuary 2024
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2981–2996https://doi.org/10.1109/TIFS.2024.3356162Using the computational resources of an untrusted third party to crack a password hash can pose a high number of privacy and security risks. The act of revealing the hash digest could in itself negatively impact both the data subject who created the ...
- research-articleJanuary 2024
Quantum-Safe Puncturable Signatures With Their Application in Blockchain
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2761–2770https://doi.org/10.1109/TIFS.2024.3353074Energy-efficient proof-of-stake (PoS) consensus protocols in blockchain have gained much attention from academia and industry recently. Despite their potential advantages, PoS protocols have not been extensively deployed in the existing digital currency ...
- research-articleJanuary 2024
Distributed Differential Privacy via Shuffling Versus Aggregation: A Curious Study
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2501–2516https://doi.org/10.1109/TIFS.2024.3351474How to achieve distributed differential privacy (DP) without a trusted central party is of great interest in both theory and practice. Recently, the shuffle model has attracted much attention. Unlike the local DP model in which the users send randomized ...
- research-articleJanuary 2024
NEMO: Practical Distributed Boolean Queries With Minimal Leakage
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2594–2608https://doi.org/10.1109/TIFS.2024.3351433Searchable symmetric encryption (SSE) schemes allow a client to store encrypted data with a storage provider and retrieve corresponding documents without revealing the content or search keywords to the provider. However, achieving efficient SSE schemes ...
- research-articleJanuary 2024
Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2732–2745https://doi.org/10.1109/TIFS.2024.3350925Electronic healthcare (E-health) cloud system enables electronic health records (EHRs) sharing and improves efficiency of diagnosis and treatment. In order to address EHRs confidentiality and authorized user access control in E-health cloud, attribute-...
- research-articleJanuary 2024
Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2454–2469https://doi.org/10.1109/TIFS.2024.3350909With the rapid development of cloud computing, massive amounts of data are uploaded to cloud servers for storage. For privacy protection, sensitive data should be encrypted before outsourcing, and ciphertext retrieval technologies based on similarity come ...
- research-articleJanuary 2024
Congruent Differential Cluster for Binary SPN Ciphers
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2385–2397https://doi.org/10.1109/TIFS.2024.3350374This study is focused on the differential clustering effect of the SPN block cipher, which employs a binary matrix as its diffusion layer. We present a novel strategy for differential estimation, named the congruent differential cluster. This method does ...
- research-articleJanuary 2024
Dynamic Searchable Symmetric Encryption With Strong Security and Robustness
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2370–2384https://doi.org/10.1109/TIFS.2024.3350330Dynamic Searchable Symmetric Encryption (DSSE) is a prospective technique in the field of cloud storage for secure search over encrypted data. A DSSE client can issue <monospace>update</monospace> queries to an honest-but-curious server for adding or ...
- research-articleDecember 2023
An Efficient and Scalable FHE-Based PDQ Scheme: Utilizing FFT to Design a Low Multiplication Depth Large-Integer Comparison Algorithm
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2258–2272https://doi.org/10.1109/TIFS.2023.3348246The growing number of data privacy breaches and associated financial losses have driven the demand for private database queries. Clients typically submit queries that involve both search and computation operations, such as counting students under a ...
- research-articleDecember 2023
Decentralized Threshold Signatures With Dynamically Private Accountability
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2217–2230https://doi.org/10.1109/TIFS.2023.3347968Threshold signature is a fundamental cryptographic primitive used in many practical applications. As proposed by Boneh and Komlo (CRYPTO’22), TAPS is a threshold signature that is a hybrid of privacy and accountability. It enables a combiner to ...
- research-articleDecember 2023
Quantum-Safe HIBE: Does It Cost a Latte?
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2680–2695https://doi.org/10.1109/TIFS.2023.3347880The United Kingdom (UK) government is considering advanced primitives such as identity-based encryption (IBE) for adoption as they transition their public-safety communications network from TETRA to an LTE-based service. However, the current LTE standard ...
- research-articleDecember 2023
Secure Full Duplex Integrated Sensing and Communications
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2082–2097https://doi.org/10.1109/TIFS.2023.3346696The following paper models a secure full duplex (FD) integrated sensing and communication (ISAC) scenario, where malicious eavesdroppers aim at intercepting the downlink (DL) as well as the uplink (UL) information exchanged between the dual functional ...
- research-articleDecember 2023
BGKey: Group Key Generation for Backscatter Communications Among Multiple Devices
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2470–2486https://doi.org/10.1109/TIFS.2023.3345650Backscatter communication (BC) is an emerging radio technology for achieving sustainable wireless communications. However, the literature still lacks an effective secret group key generation scheme for safeguarding communications among multiple resource-...
- research-articleDecember 2023
P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection
- Guowei Ling,
- Fei Tang,
- Chaochao Cai,
- Jinyong Shan,
- Haiyang Xue,
- Wulu Li,
- Peng Tang,
- Xinyi Huang,
- Weidong Qiu
IEEE Transactions on Information Forensics and Security (TIFS), Volume 192024, pp 2201–2216https://doi.org/10.1109/TIFS.2023.3343973Private Set Intersection (PSI) protocols can securely compute the intersection of the private sets on the server and the client without revealing additional data. This work introduces the concept of Privacy-Preserving Feature Retrieved Private Set ...