Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2024
StopGuess: A framework for public-key authenticated encryption with keyword search
AbstractPublic key encryption with keyword search (PEKS) allows users to search on encrypted data without leaking the keyword information from the ciphertexts. But it does not preserve keyword privacy within the trapdoors, because an adversary (e.g., ...
Highlights- We present StopGuess for PAEKS to give a general solution to eliminate IKGA.
- We present two generic constructions of PAEKS with StopGuess to demonstrate its the superiority.
- We extend PAEKS to support further properties or features ...
- research-articleJanuary 2024
When Evolutionary Computation Meets Privacy
IEEE Computational Intelligence Magazine (COMPINT), Volume 19, Issue 1Pages 66–74https://doi.org/10.1109/MCI.2023.3327892Recently, evolutionary computation (EC) has experienced significant advancements due to the integration of machine learning, distributed computing, and big data technologies. These developments have led to new research avenues in EC, such as distributed ...
- research-articleMay 2024
SOCI+: An Enhanced Toolkit for Secure Outsourced Computation on Integers
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 5607–5619https://doi.org/10.1109/TIFS.2024.3402173Secure outsourced computation is critical for cloud computing to safeguard data confidentiality and ensure data usability. Recently, secure outsourced computation schemes following a twin-server architecture based on partially homomorphic cryptosystems ...
- research-articleNovember 2023
STDA: Secure Time Series Data Analytics With Practical Efficiency in Wide-Area Network
IEEE Transactions on Information Forensics and Security (TIFS), Volume 19Pages 1440–1454https://doi.org/10.1109/TIFS.2023.3336512Time series data analytics technology significantly benefits modern scientific research, especially in fields such as medical health, financial investment, and transportation. Unfortunately, privacy issues hinder people from handing over the data to a ...
- research-articleJanuary 2023
CrowdFA: A Privacy-Preserving Mobile Crowdsensing Paradigm via Federated Analytics
IEEE Transactions on Information Forensics and Security (TIFS), Volume 18Pages 5416–5430https://doi.org/10.1109/TIFS.2023.3308714Mobile crowdsensing (MCS) systems typically struggle to address the challenge of data aggregation, incentive design, and privacy protection, simultaneously. However, existing solutions usually focus on one or, at most, two of these issues. To this end, ...
- research-articleApril 2020
Public key encryption with conjunctive keyword search on lattice
Journal of Information Security and Applications (JISA), Volume 51, Issue Chttps://doi.org/10.1016/j.jisa.2019.102433AbstractOutsourcing data in cloud storage is gaining popularity recently. For protecting data privacy, the data should be encrypted, and it is thus critical to provide search services for encrypted outsourced data. However, it becomes a ...
- research-articleNovember 2019
Towards efficient privacy-preserving face recognition in the cloud
Signal Processing (SIGN), Volume 164, Issue CPages 320–328https://doi.org/10.1016/j.sigpro.2019.06.024Highlights- We propose a randomness-based privacy-preserving face recognition scheme.
- We ...
Face recognition (FR) has become increasingly significant in many computer vision applications. However, with the rapid deployment of FR, the privacy of face images has been a growing concern, especially when FR is performed in cloud ...
- research-articleMay 2019
A Novel Robotic Suturing System for Flexible Endoscopic Surgery
2019 International Conference on Robotics and Automation (ICRA)Pages 1514–1520https://doi.org/10.1109/ICRA.2019.8794247Perforations in flexible endoscopy are life-threatening. Defect closure or suturing in flexible endoscopy has long been a critical challenge due to the confined space of the access routes and surgical sites, high dexterity and force demands of suturing ...
- research-articleOctober 2018
Efficient biometric identity-based encryption
Information Sciences: an International Journal (ISCI), Volume 465, Issue CPages 248–264https://doi.org/10.1016/j.ins.2018.07.028AbstractAs a special case of public key encryption, identity-based encryption (IBE) takes any public known information as public key for encryption and then decrypts a ciphertext by a well-generated private key from private key generator (PKG)...
- research-articleFebruary 2018
Achieving verifiable, dynamic and efficient auditing for outsourced database in cloud
Journal of Parallel and Distributed Computing (JPDC), Volume 112, Issue P1Pages 97–107https://doi.org/10.1016/j.jpdc.2017.10.004With the help of cloud computing, users can outsource their data to a cloud service provider (CSP) and enjoy the high-quality on-demand services from the cloud. On the other hand, once owners no longer have physical possession of the outsourced data, ...
- articleMarch 2017
Image quality assessment based on multiscale fuzzy gradient similarity deviation
Soft Computing - A Fusion of Foundations, Methodologies and Applications (SOFC), Volume 21, Issue 5Pages 1145–1155https://doi.org/10.1007/s00500-015-1844-9Although a great number of objective methods for assessing perceptual image quality have been proposed, their performances on different distortion types are still unsatisfactory. It is a great challenge for image quality assessment (IQA) that distorted ...
- research-articleJune 2016
Processing secure, verifiable and efficient SQL over outsourced database
Information Sciences: an International Journal (ISCI), Volume 348, Issue CPages 163–178https://doi.org/10.1016/j.ins.2016.02.018Database as a Service (DBaaS) economically enables the customers with limited resources to outsource large-scale databases to the cloud. However, it becomes a very challenging problem that how to execute SQL on outsourced databases while protecting the ...
- research-articleMay 2016
Bilateral-secure Signature by Key Evolving
ASIA CCS '16: Proceedings of the 11th ACM on Asia Conference on Computer and Communications SecurityPages 523–533https://doi.org/10.1145/2897845.2897864In practice, the greatest threat against the security of a digital signature scheme is the exposure of signing key, since the forward security of past signatures and the backward security of future signatures could be compromised. There are some ...
- research-articleMay 2016
Perceptual Visual Security Index Based on Edge and Texture Similarities
IEEE Transactions on Information Forensics and Security (TIFS), Volume 11, Issue 5Pages 951–963https://doi.org/10.1109/TIFS.2016.2515503With the development in recent decades of various efficient image encryption algorithms, such as selective encryption, a great demand has arisen for methods of evaluating the visual security of encrypted images. Existing solutions usually adopt well-...