Cryptographic Protocols for Privacy-Oriented Applications

Hybrid Routing: Balancing Anonymity and Resilience in Anonymous Communication Networks

Anonymous communication networks (ACNs) are intended to protect the metadata privacy during the communication. As typical ACNs, onion mix-nets adopt source routing where the source defines a static path and wraps the message with the public keys of …

APGS: An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer

Due to the revelations of global-scale pervasive surveillance programs, Internet users have an increasing demand for privacy. However, this is usually undesirable for network service providers because attackers would be able to anonymize themselves …

Hybrid Routing: Towards Resilient Routing in Anonymous Communication Networks

Anonymous communication networks (ACNs) are intended to protect the metadata during communication. As classic ACNs, onion mix-nets are famous for strong anonymity, in which the source defines a static path and wraps the message multi-times with the …

Towards Practical Privacy-Preserving Decision Tree Training and Evaluation in the Cloud

Due to the capacity of storing massive data and providing huge computing resources, cloud computing has been a desirable platform for doing machine learning. However, the issue of data privacy is far from being well solved and thus has been a general …

ME-TLS: Middlebox-Enhanced TLS for Internet-of-things Devices

In-network middleboxes are vital for Internet-of-things system security, but the widely adopted Transport Layer Security (TLS) protocol blinds application-level middleboxes due to the encryption of traffic data. To resolve this problem, many …

Towards Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data

Nowadays, outsourcing data and machine learning tasks, e.g., k􀀀nearest neighbour (KNN) classification, to clouds has become a scalable and cost-effective way for large scale data storage, management, and processing. However, data security and privacy …

Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience

Biometric-based remote user authentication is a useful primitive that allows an authorized user to authenticate to a remote server using his biometrics. Leakage attacks, such as side-channel attacks, allow an attacker to learn partial knowledge of …

Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters

Identity-based revocation system (IBRS) produces a ciphertext based on the revoked identities such that this ciphertext can only be decrypted by the private keys of non-revoked identities. IBRS can be classified into unbounded IBRS and bounded IBRS, …

Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties

It has been widely recognized as a challenge to carry out data analysis and meanwhile preserve its privacy in the cloud. In this work, we mainly focus on a well-known data analysis approach namely association rule mining. We found that the data …

Practical Privacy-Preserving Deep Packet Inspection Outsourcing

Hardware-based middleboxes are ubiquitous in computer networks, which usually incur high deployment and management expenses. A recently arising trend aims to address those problems by outsourcing the functions of traditional hardware-based …