2

Hybrid Routing: Balancing Anonymity and Resilience in Anonymous Communication Networks

Anonymous communication networks (ACNs) are intended to protect the metadata privacy during the communication. As typical ACNs, onion mix-nets adopt source routing where the source defines a static path and wraps the message with the public keys of …

APGS: An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer

Due to the revelations of global-scale pervasive surveillance programs, Internet users have an increasing demand for privacy. However, this is usually undesirable for network service providers because attackers would be able to anonymize themselves …

Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage

Message-Locked Encryption (MLE) is a useful tool to enable deduplication over encrypted data in cloud storage. It can significantly improve the cloud service quality by eliminating redundancy to save storage resources, and hence user cost, and also …

Privacy-enhanced remote data integrity checking with updatable timestamp

Remote data integrity checking (RDIC) enables clients to verify whether the outsourced data is intact without keeping a copy locally or downloading it. Nevertheless, the existing RDIC schemes do not support the pay-as-you-go (PAYG) payment model, …

Towards Practical Privacy-Preserving Decision Tree Training and Evaluation in the Cloud

Due to the capacity of storing massive data and providing huge computing resources, cloud computing has been a desirable platform for doing machine learning. However, the issue of data privacy is far from being well solved and thus has been a general …

ME-TLS: Middlebox-Enhanced TLS for Internet-of-things Devices

In-network middleboxes are vital for Internet-of-things system security, but the widely adopted Transport Layer Security (TLS) protocol blinds application-level middleboxes due to the encryption of traffic data. To resolve this problem, many …

On the Security of LWE Cryptosystem against Subversion Attacks

Subversion of cryptography has received wide attentions especially after the Snowden Revelations in 2013. Most of the currently proposed subversion attacks essentially rely on the freedom of randomness choosing in the cryptographic protocol to hide …

Towards Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data

Nowadays, outsourcing data and machine learning tasks, e.g., k􀀀nearest neighbour (KNN) classification, to clouds has become a scalable and cost-effective way for large scale data storage, management, and processing. However, data security and privacy …

Strongly leakage resilient authenticated key exchange, revisited

Authenticated Key Exchange (AKE) protocols allow two (or multiple) parties to authenticate each other and agree on a common secret key, which is essential for establishing a secure communication channel over a public network. AKE protocols form a …

A Practical Authentication Framework for VANETs

In vehicular ad hoc networks (VANETs), conditional privacy preserving authentication (CPPA) scheme is widely deployed to solve security and privacy issues. Existing CPPA schemes usually require ideal tamper-proof devices (TPDs) on vehicles which, …