A survey on cryptographic techniques for protecting big data security: present and forthcoming

S Lu, J Zheng, Z Cao, Y Wang, C Gu - Science China Information …, 2022 - Springer
Big data drive multidimensional convergence and profound innovations among industries
and provide novel ways of exploring the world. As they significantly create economic and …

Three lessons from threema: Analysis of a secure messenger

KG Paterson, M Scarlata, KT Truong - 32nd USENIX Security Symposium …, 2023 - usenix.org
We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted
messaging application with more than 10 million users and 7000 corporate customers. We …

Efficient schemes for committing authenticated encryption

M Bellare, VT Hoang - Annual International Conference on the Theory and …, 2022 - Springer
This paper provides efficient authenticated-encryption (AE) schemes in which a ciphertext is
a commitment to the key. These are extended, at minimal additional cost, to schemes where …

{Zero-Knowledge} Middleboxes

P Grubbs, A Arun, Y Zhang, J Bonneau… - 31st USENIX Security …, 2022 - usenix.org
This paper initiates research on zero-knowledge middleboxes (ZKMBs). A ZKMB is a
network middlebox that enforces network usage policies on encrypted traffic. Clients send …

On-demand Container Loading in {AWS} Lambda

M Brooker, M Danilov, C Greenwood… - 2023 USENIX Annual …, 2023 - usenix.org
AWS Lambda is a serverless event-driven compute service, part of a category of cloud
compute offerings sometimes called Function-as-a-service (FaaS). When we first released …

Anonymous, robust post-quantum public key encryption

P Grubbs, V Maram, KG Paterson - … on the Theory and Applications of …, 2022 - Springer
A core goal of the NIST PQC competition is to produce PKE schemes which, even if attacked
with a large-scale quantum computer, maintain the security guarantees needed by …

On committing authenticated-encryption

J Chan, P Rogaway - European Symposium on Research in Computer …, 2022 - Springer
We provide a strong definition for committing authenticated-encryption (cAE), as well as a
framework that encompasses earlier and weaker definitions. The framework attends not only …

Key rotation for authenticated encryption

A Everspaugh, K Paterson, T Ristenpart… - Advances in Cryptology …, 2017 - Springer
A common requirement in practice is to periodically rotate the keys used to encrypt stored
data. Systems used by Amazon and Google do so using a hybrid encryption technique …

Identifying harmful media in {End-to-End} encrypted communication: Efficient private membership computation

A Kulshrestha, J Mayer - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
End-to-end encryption (E2EE) poses a challenge for automated detection of harmful media,
such as child sexual abuse material and extremist content. The predominant approach at …

MEGA: malleable encryption goes awry

M Backendal, M Haller… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
MEGA is a leading cloud storage platform with more than 250 million users and 1000
Petabytes of stored data. MEGA claims to offer user-controlled, end-to-end security. This is …