sponsored by the National Natural Science Foundation of China(Grant Nos.62302114,62172353 and U20B2046);the Innovation Fund Program of the Engineering Research Center for Integration and Application of Digital Learning Technology of Ministry of Education(Nos.1331007,1311022);the Natural Science Foundation of Guangdong Province(No.2024A1515010177).
1 Introduction Traditional covert communication[1]usually relies on centralized channels,which are efficient in transmission but susceptible to eavesdropping and attacks,leading to information leakage.However,distribu...
supported in part by National Natural Science Foundation of China(Grant Nos.62072134,62472150,U2001205);Major Research Plan of Hubei Province(Grant No.2023BAA027);Key Research and Development Program of Hubei Province(Grant No.2021BEA163)。
Witness encryption(WE)is a novel type of cryptographic primitive that enables a message to be encrypted via an NP instance.Anyone who possesses a solution to this instance(i.e.,a witness)can then recover the message f...
supported by the National Natural Science Foundation of China(Nos.62172337,62241207);Key Project of GansuNatural Science Foundation(No.23JRRA685).
Traditional email systems can only achieve one-way communication,which means only the receiver is allowed to search for emails on the email server.In this paper,we propose a blockchain-based certificateless bidirectio...
supported by the Henan Key Laboratory of Network Cryptography Technology(LNCT2022-A11);the Shaanxi Key Laboratory of Information Communication Network and Security(ICNS202006)。
Proxy re-encryption(PRE)allows users to transfer decryption rights to the data requester via proxy.Due to the current PRE schemes from lattice(LPRE)cannot fulfill chosen-ciphertext attack(CCA)security,an identity-base...
The cloud allows clients to store and share data.Depending on the user’s needs,it is imperative to design an effective access control plan to share the information only with approved users.The user loses control of t...
Internet of Things(IoT)enables devices to get connected to the internet.Once they are connected,they behave as smart devices thereby releasing sensitive data periodically.There is a necessity to preserve the confident...
This work was supported in part by the Mid-Career Researcher and Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Science and ICT(MSIT);Future Planning under Grant NRF2020R1A2C2014336 and Grant NRF2021R1F1A105611511.
Recently,there has been a sudden shift from using traditional office applications to the collaborative cloud-based office suite such as Microsoft Office 365.Such cloud-based systems allow users to work together on the...
the Researchers Supporting Program(TUMAProject-2021-27)Almaarefa University,Riyadh,Saudi Arabia.
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and preve...
supported by National Natural Science Foundation of China(61370188,61732021);Beijing Municipal Education Commission Scientific Research Project(KM202010015009,KM202110015004);Beijing Institute of Graphic Communication Doctoral Funding Project(27170120003/020,27170122006);The BIGC Project(Ec202201);Beijing Institute of Graphic Communication Research Innovation Team Project(Eb202101);Intramural Discipline Construction Project of Beijing Institute of Graphic Communication(21090121021);Key Educational Reform Project of Beijing Institute of Graphic Communication(22150121033/009).
The cloud’s storage and query of private information have the cryptographic scholar due to the proliferation of cloud computing.In the traditional query mode,the private information stored in the cloud is at risk of ...
supported by National Key Research and Development Project(Grant No.2020YFA0712300);National Natural Science Foundation of China(Grants Nos.61772548,61632012);Foundation of Science and Technology on Information Assurance Laboratory(Grant No.KJ-17-001);Peng Cheng Laboratory Project of Guangdong Province(Grant No.PCL2018KP004)。
Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world.As they significantly create economic and social value,big data meaningfully impact t...