Data security and privacy protection for cloud storage: A survey

P Yang, N Xiong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
The new development trends including Internet of Things (IoT), smart city, enterprises digital
transformation and world's digital economy are at the top of the tide. The continuous growth …

Indistinguishability obfuscation from well-founded assumptions

A Jain, H Lin, A Sahai - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …

Public-key cryptosystems resilient to key leakage

M Naor, G Segev - Advances in Cryptology-CRYPTO 2009: 29th Annual …, 2009 - Springer
Most of the work in the analysis of cryptographic schemes is concentrated in abstract
adversarial models that do not capture side-channel attacks. Such attacks exploit various …

Non-malleable codes

S Dziembowski, K Pietrzak, D Wichs - Journal of the ACM (JACM), 2018 - dl.acm.org
We introduce the notion of “non-malleable codes” which relaxes the notion of error
correction and error detection. Informally, a code is non-malleable if the message contained …

Key-policy attribute-based encryption against continual auxiliary input leakage

J Li, Q Yu, Y Zhang, J Shen - Information Sciences, 2019 - Elsevier
Attribute-based encryption mechanism can achieve very flexible access control, so it has a
wide range of applications in the distributed environment, such as fine-grained access …

Hierarchical attribute based encryption with continuous leakage-resilience

J Li, Q Yu, Y Zhang - Information Sciences, 2019 - Elsevier
Attribute based encryption (ABE) is widely applied in cloud computing settings due to its fine-
grained access control. Most ABE schemes do not consider the side channel attacks which …

Cryptography against continuous memory attacks

Y Dodis, K Haralambiev, A López-Alt… - 2010 IEEE 51st …, 2010 - ieeexplore.ieee.org
We say that a cryptographic scheme is Continuous Leakage-Resilient (CLR), if it allows
users to refresh their secret keys, using only fresh local randomness, such that: 1. The …

Achieving leakage resilience through dual system encryption

A Lewko, Y Rouselakis, B Waters - Theory of Cryptography: 8th Theory of …, 2011 - Springer
In this work, we show that strong leakage resilience for cryptosystems with advanced
functionalities can be obtained quite naturally within the methodology of dual system …

Tamper and leakage resilience in the split-state model

FH Liu, A Lysyanskaya - Annual Cryptology Conference, 2012 - Springer
It is notoriously difficult to create hardware that is immune from side channel and tampering
attacks. A lot of recent literature, therefore, has instead considered algorithmic defenses from …

Non-malleable codes from two-source extractors

S Dziembowski, T Kazana, M Obremski - Annual Cryptology Conference, 2013 - Springer
We construct an efficient information-theoretically non-malleable code in the split-state
model for one-bit messages. Non-malleable codes were introduced recently by …