scispace - formally typeset
Journal ArticleDOI

Insight of the protection for data security under selective opening attacks

TLDR
This paper formalizes the security notion of non-malleability under selective opening attacks (NM-SO security), and explores the relations between NM-SOSecurity and the standard SOA security, the relations among NM-so security notions, and the relations amongst NM- SO security notions.
About
This article is published in Information Sciences.The article was published on 2017-10-01. It has received 147 citations till now. The article focuses on the topics: Cloud computing security & Computer security model.

read more

Citations
More filters
Journal ArticleDOI

Secure attribute-based data sharing for resource-limited users in cloud computing

TL;DR: This paper proposes a new attribute-based data sharing scheme suitable for resource-limited mobile users in cloud computing and is proven secure against adaptively chosen-ciphertext attacks, which is widely recognized as a standard security notion.
Journal ArticleDOI

BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0

TL;DR: This work presents a blockchain-based system for secure mutual authentication, BSeIn, to enforce fine-grained access control polices and is designed to provide privacy and security guarantees such as anonymous authentication, auditability, and confidentiality.
Journal ArticleDOI

Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks

TL;DR: This paper proposes a cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks that can provide stronger security protection of private information than most of existing schemes in insecure channel.
Journal ArticleDOI

Blockchain based efficient and robust fair payment for outsourcing services in cloud computing

TL;DR: BCPay, a blockchain based fair payment framework for outsourcing services in cloud computing, is introduced and the security analysis indicates that BCPay achieves Soundness and Robust Fairness, where the fairness is resilient to eavesdropping and malleability attacks.
Journal ArticleDOI

An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols

TL;DR: This comprehensive survey focuses on the security architecture of IoT and provides a detailed taxonomy of major challenges associated with the field and the key technologies, including Radio Frequency Identification and Wireless Sensor Networks, that are enabling factors in the development of IoT.
References
More filters
Journal Article

Relations among notions of security for public-key encryption schemes

TL;DR: In this article, the relative strengths of popular notions of security for public key encryption schemes are compared under chosen plaintext attack and two kinds of chosen ciphertext attack, and the goals of privacy and non-malleability are considered.
Journal ArticleDOI

A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

TL;DR: This paper constructs a special tree-based index structure and proposes a “Greedy Depth-first Search” algorithm to provide efficient multi-keyword ranked search over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents.
Journal ArticleDOI

Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack

TL;DR: In this paper, a new public-key encryption scheme, along with several variants, is proposed and analyzed, and its variants are proved secure against adaptive chosen ciphertext attack under standard intractability assumptions.
Journal ArticleDOI

Nonmalleable Cryptography

TL;DR: The cryptosystem is the first proven to be secure against a strong type of chosen ciphertext attack proposed by Rackoff and Simon, in which the attacker knows the ciphertext she wishes to break and can query the decryption oracle on any ciphertext other than the target.
Posted Content

Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack.

TL;DR: A new public-key encryption scheme, along with several variants, is proposed and analyzed that appear to be the first public- key encryption schemes in the literature that are simultaneously practical and provably secure.
Related Papers (5)