scispace - formally typeset
Journal ArticleDOI

Insight of the protection for data security under selective opening attacks

TLDR
This paper formalizes the security notion of non-malleability under selective opening attacks (NM-SO security), and explores the relations between NM-SOSecurity and the standard SOA security, the relations among NM-so security notions, and the relations amongst NM- SO security notions.
About
This article is published in Information Sciences.The article was published on 2017-10-01. It has received 147 citations till now. The article focuses on the topics: Cloud computing security & Computer security model.

read more

Citations
More filters
Journal ArticleDOI

Secure attribute-based data sharing for resource-limited users in cloud computing

TL;DR: This paper proposes a new attribute-based data sharing scheme suitable for resource-limited mobile users in cloud computing and is proven secure against adaptively chosen-ciphertext attacks, which is widely recognized as a standard security notion.
Journal ArticleDOI

BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0

TL;DR: This work presents a blockchain-based system for secure mutual authentication, BSeIn, to enforce fine-grained access control polices and is designed to provide privacy and security guarantees such as anonymous authentication, auditability, and confidentiality.
Journal ArticleDOI

Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks

TL;DR: This paper proposes a cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks that can provide stronger security protection of private information than most of existing schemes in insecure channel.
Journal ArticleDOI

Blockchain based efficient and robust fair payment for outsourcing services in cloud computing

TL;DR: BCPay, a blockchain based fair payment framework for outsourcing services in cloud computing, is introduced and the security analysis indicates that BCPay achieves Soundness and Robust Fairness, where the fairness is resilient to eavesdropping and malleability attacks.
Journal ArticleDOI

An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols

TL;DR: This comprehensive survey focuses on the security architecture of IoT and provides a detailed taxonomy of major challenges associated with the field and the key technologies, including Radio Frequency Identification and Wireless Sensor Networks, that are enabling factors in the development of IoT.
References
More filters
Book ChapterDOI

Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening

TL;DR: A process for improving the lightfastness of dyeings obtained with acid dyes and/or metal complex dyes on polyamide textile materials, by treating the latter with 0.01-1% by weight of a copper hydroxamate before, during or after dyeing.
Book ChapterDOI

Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization

TL;DR: In this paper, it was shown that non-malleability is equivalent to indistinguishability under a parallel chosen ciphertext attack, this being a new kind of chosen cipher text attack, in which the adversary's decryption queries are not allowed to depend on answers to previous queries, but must be made all at once.
Journal ArticleDOI

Enabling Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data

TL;DR: This paper defines and solves the problems of semantic search based on conceptual graphs (CGs) over encrypted outsourced data in clouding computing (SSCG) and proposes a basic idea for SSCG and gives a significantly improved scheme to satisfy the security guarantee of searchable symmetric encryption (SSE).
Journal ArticleDOI

Hidden attribute-based signatures without anonymity revocation

Jin Li, +1 more
- 01 May 2010 - 
TL;DR: Two constructions of hidden attribute-based signature from pairings are proposed, one of which supports a large universe of attributes and its security proof relies on the random oracle assumption, which can be removed in the second construction.
Book ChapterDOI

Lossy encryption: constructions from general assumptions and efficient selective opening chosen ciphertext security

TL;DR: In this article, it was shown that statistically hiding 2-round oblivious transfer implies lossy encryption and smooth hash proof systems, and that private information retrieval and homomorphic encryption both imply lossy encryptions, and thus selective opening secure public key encryption.
Related Papers (5)