Journal ArticleDOI
Insight of the protection for data security under selective opening attacks
TLDR
This paper formalizes the security notion of non-malleability under selective opening attacks (NM-SO security), and explores the relations between NM-SOSecurity and the standard SOA security, the relations among NM-so security notions, and the relations amongst NM- SO security notions.About:
This article is published in Information Sciences.The article was published on 2017-10-01. It has received 147 citations till now. The article focuses on the topics: Cloud computing security & Computer security model.read more
Citations
More filters
Journal ArticleDOI
Secure attribute-based data sharing for resource-limited users in cloud computing
TL;DR: This paper proposes a new attribute-based data sharing scheme suitable for resource-limited mobile users in cloud computing and is proven secure against adaptively chosen-ciphertext attacks, which is widely recognized as a standard security notion.
Journal ArticleDOI
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0
TL;DR: This work presents a blockchain-based system for secure mutual authentication, BSeIn, to enforce fine-grained access control polices and is designed to provide privacy and security guarantees such as anonymous authentication, auditability, and confidentiality.
Journal ArticleDOI
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
TL;DR: This paper proposes a cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks that can provide stronger security protection of private information than most of existing schemes in insecure channel.
Journal ArticleDOI
Blockchain based efficient and robust fair payment for outsourcing services in cloud computing
TL;DR: BCPay, a blockchain based fair payment framework for outsourcing services in cloud computing, is introduced and the security analysis indicates that BCPay achieves Soundness and Robust Fairness, where the fairness is resilient to eavesdropping and malleability attacks.
Journal ArticleDOI
An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols
Brij B. Gupta,Megha Quamara +1 more
TL;DR: This comprehensive survey focuses on the security architecture of IoT and provides a detailed taxonomy of major challenges associated with the field and the key technologies, including Radio Frequency Identification and Wireless Sensor Networks, that are enabling factors in the development of IoT.
References
More filters
Journal Article
Relations among notions of security for public-key encryption schemes
TL;DR: In this article, the relative strengths of popular notions of security for public key encryption schemes are compared under chosen plaintext attack and two kinds of chosen ciphertext attack, and the goals of privacy and non-malleability are considered.
Journal ArticleDOI
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
TL;DR: This paper constructs a special tree-based index structure and proposes a “Greedy Depth-first Search” algorithm to provide efficient multi-keyword ranked search over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents.
Journal ArticleDOI
Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
Ronald Cramer,Victor Shoup +1 more
TL;DR: In this paper, a new public-key encryption scheme, along with several variants, is proposed and analyzed, and its variants are proved secure against adaptive chosen ciphertext attack under standard intractability assumptions.
Journal ArticleDOI
Nonmalleable Cryptography
TL;DR: The cryptosystem is the first proven to be secure against a strong type of chosen ciphertext attack proposed by Rackoff and Simon, in which the attacker knows the ciphertext she wishes to break and can query the decryption oracle on any ciphertext other than the target.
Posted Content
Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack.
Ronald Cramer,Victor Shoup +1 more
TL;DR: A new public-key encryption scheme, along with several variants, is proposed and analyzed that appear to be the first public- key encryption schemes in the literature that are simultaneously practical and provably secure.