Title | ||
---|---|---|
Data security against receiver corruptions: SOA security for receivers from simulatable DEMs. |
Abstract | ||
---|---|---|
Data security and privacy protection issues are the primary network security threats. The notion of selective opening security (SOA) for receivers focuses on such a scenario of multi-user setting: there are one sender and multiple receivers. Upon receiving the multiple challenge ciphertexts, even if the adversary is allowed to corrupt some of the receivers (e.g. the Heartbleed attack) by obtaining the decryption keys corresponding to some of the challenge ciphertexts, the SOA security for receivers requires that the ciphertexts of the uncorrupted receivers remain secure. The setting of receiver corruptions is much less studied than that of sender corruptions, where the corrupted senders expose their messages and the random coins employed during the encryption. |
Year | DOI | Venue |
---|---|---|
2019 | 10.1016/j.ins.2018.08.059 | Information Sciences |
Keywords | Field | DocType |
Data security,Selective opening security for receivers,Chosen-ciphertext attacks,Hybrid encryption,Ideal cipher model | Hybrid cryptosystem,Heartbleed,Cipher,Data security,Computer security,Network security,Key encapsulation,Encryption,SOA Security,Artificial intelligence,Mathematics,Machine learning | Journal |
Volume | ISSN | Citations |
471 | 0020-0255 | 2 |
PageRank | References | Authors |
0.36 | 33 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
zhengan huang | 1 | 241 | 9.82 |
Junzuo Lai | 2 | 419 | 24.55 |
Wenbin Chen | 3 | 8 | 3.58 |
Tong Li | 4 | 185 | 11.93 |
Yang Xiang | 5 | 2930 | 212.67 |