4.5 Article

A Secure and Lightweight Multi-Party Private Intersection-Sum Scheme over a Symmetric Cryptosystem

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Review Computer Science, Information Systems

Internet of Things intrusion detection systems: a comprehensive review and future directions

Arash Heidari et al.

Summary: The security of IoT involves not only network and data security but also human health and life attacks. The integration of Intrusion Detection System (IDS) with IoT systems is important for protecting system security.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2023)

Review Computer Science, Theory & Methods

Machine Learning Applications in Internet-of-Drones: Systematic Review, Recent Deployments, and Open Issues

Arash Heidari et al.

Summary: Deep Learning (DL) and Machine Learning (ML) are widely used in various sectors such as healthcare, industry, and academia. The Internet of Drones (IoD) is a recent development that offers adaptability to unpredictable situations. Unmanned Aerial Vehicles (UAVs) have diverse applications, including rescue missions, farming, and surveillance systems, due to their technical advantages. However, deploying drone systems presents challenges related to wireless unpredictability, mobility, and battery life. This research aims to provide a comprehensive understanding of IoD/UAV fundamentals, recent developments, existing methods, and areas for further investigation.

ACM COMPUTING SURVEYS (2023)

Review Engineering, Multidisciplinary

Review and potential for artificial intelligence in healthcare

Lina Sun et al.

Summary: In the field of medical image analysis, it is crucial to recognize brain tumors for early cancer diagnosis. The most commonly used technique for tumor segmentation is Magnetic Resonance Imaging (MRI). This paper thoroughly discusses recent brain tumor segmentation techniques, along with quantitative analysis and performance evaluation of existing methods.

INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT (2022)

Article Chemistry, Analytical

An Industrial IoT-Based Blockchain-Enabled Secure Searchable Encryption Approach for Healthcare Systems Using Neural Network

Aitizaz Ali et al.

Summary: This paper proposes a novel algorithm based on group theory and deep neural networks to address security issues in the IoT. By utilizing blockchain and homomorphic encryption techniques, a secure patient healthcare data access scheme is devised, providing better efficiency and security in current schemes for sharing digital healthcare data.

SENSORS (2022)

Article Computer Science, Artificial Intelligence

Privacy-preserving statistical computing protocols for private set intersection

Ziyu Niu et al.

Summary: Secure multiparty computation (MPC) can protect data privacy, and the ASPMT protocol can efficiently compute results without revealing additional information when processing statistical computations on intersecting data.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2022)

Article Green & Sustainable Science & Technology

Traffic Flow Prediction: An Intelligent Scheme for Forecasting Traffic Flow Using Air Pollution Data in Smart Cities with Bagging Ensemble

Noor Ullah Khan et al.

Summary: Traffic flow prediction is crucial for traffic management in smart cities. This research aims to forecast traffic flow using pollution data and compares different regression techniques. The results demonstrate that the KNN bagging ensemble model outperforms other models, reducing the error rate in predicting traffic congestion by over 30%.

SUSTAINABILITY (2022)

Meeting Abstract Geriatrics & Gerontology

DIAGNOSTIC TEST ACCURACY OF FRAILTY SCREENING TOOLS USING DATA IN ELECTRONIC PRIMARY CARE RECORDS

S. Makin et al.

AGE AND AGEING (2022)

Article Multidisciplinary Sciences

Cryptosystems Based on Tropical Congruent Transformation of Symmetric Matrices

Huawei Huang

Summary: A new public-key cryptosystem based on tropical methods is proposed in this paper, utilizing symmetric matrix and circular matrix transformations to withstand known attacks. The public key and private key lengths of the new system are half that of existing schemes described in literature.

SYMMETRY-BASEL (2022)

Article Multidisciplinary Sciences

Efficient Sequential and Parallel Prime Sieve Algorithms

Hazem M. Bahig et al.

Summary: This paper introduces three new prime sieve algorithms based on two approaches, and the experimental results show that these algorithms are more effective in terms of running time, storage, and scalability in generating primes compared to the recent algorithm.

SYMMETRY-BASEL (2022)

Article Multidisciplinary Sciences

Intelligent Bio-Latticed Cryptography: A Quantum-Proof Efficient Proposal

Ohood Saud Althobaiti et al.

Summary: The emergence of IoT and tactile internet has provided high-quality connectivity for smart systems, while quantum computing is supporting the next technological revolution. However, quantum computing also introduces threats to cybersecurity algorithms. This research proposes a lattice-driven cryptosystem for face recognition that effectively overcomes these challenges and demonstrates high performance.

SYMMETRY-BASEL (2022)

Article Multidisciplinary Sciences

Application of DNA Coding, the Lorenz Differential Equations and a Variation of the Logistic Map in a Multi-Stage Cryptosystem

Mohamed Gabr et al.

Summary: This paper proposes a 3-stage image cryptosystem that guarantees the asymmetry between encrypted and original images through confusion- and diffusion-inducing stages. Extensive numerical analysis demonstrates the robustness and efficacy of the algorithm in various aspects.

SYMMETRY-BASEL (2022)

Article Multidisciplinary Sciences

Cryptanalysis of RSA-Variant Cryptosystem Generated by Potential Rogue CA Methodology

Zahari Mahad et al.

Summary: This study analyzes the Murru-Saettone RSA variant scheme, which obtains key pairs using the RCA method. By analyzing the approximate value of psi, we can identify the maliciously provided key pairs even if the size of the private key d is approximate to psi.

SYMMETRY-BASEL (2022)

Article Multidisciplinary Sciences

Small Private Exponent Attacks on RSA Using Continued Fractions and Multicore Systems

Hatem M. Bahig et al.

Summary: This paper presents a new technique that improves the attack on RSA with small private exponent using continued fractions and multicore systems. By finding an interval containing phi(n) and generating different points within the interval, the proposed technique enables the recovery of the private key. Experimental results show that the previous bound of the private key has been extended after three attacks on RSA with small private exponents.

SYMMETRY-BASEL (2022)

Article Computer Science, Information Systems

An improved anti-quantum MST3 public key encryption scheme for remote sensing images

Xianmin Wang et al.

Summary: An improved anti-quantum MST3 public key encryption scheme for remote sensing images is proposed in this paper, which effectively resists current quantum attacks using the MST3 cryptosystem and achieves progress in the nonmalleable property. Compared with previous MST series encryption schemes, our scheme has slightly higher efficiency.

ENTERPRISE INFORMATION SYSTEMS (2021)

Article Computer Science, Hardware & Architecture

Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT

Jing Li et al.

Summary: Privacy protection in IoT is crucial. The new ID-MRPKE scheme improves security level and its security under standard model is proven, based on k-level Multilinear-maps Decisional Deffie-Hellman assumption.

MOBILE NETWORKS & APPLICATIONS (2021)

Article Chemistry, Analytical

GAN-Based Differential Private Image Privacy Protection Framework for the Internet of Multimedia Things

Jinao Yu et al.

Summary: This paper presents a new image privacy protection framework that combines deep neural network and generative adversarial network with differential privacy technology to protect sensitive personal information in images collected by IoMT devices. The experimental results demonstrate that the framework can effectively protect user privacy while maintaining the utility of images.

SENSORS (2021)

Article Computer Science, Hardware & Architecture

Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key

Wenbin Chen et al.

Summary: This paper discusses proxy re-signature schemes, introduces different types of schemes, and proposes the first unidirectional infinite-use proxy re-signature scheme and identity-based unidirectional infinite-use proxy re-signature scheme based on lattice, proving their security in the random oracle model.

JOURNAL OF COMPUTER AND SYSTEM SCIENCES (2021)

Article Computer Science, Theory & Methods

Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system

Heng Ye et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Artificial Intelligence

Secure video retrieval using image query on an untrusted cloud

Hongyang Yan et al.

APPLIED SOFT COMPUTING (2020)

Article Computer Science, Information Systems

Blockchain-based public auditing and secure deduplication with fair arbitration

Haoran Yuan et al.

INFORMATION SCIENCES (2020)

Proceedings Paper Computer Science, Information Systems

On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality

Mihaela Ion et al.

2020 5TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2020) (2020)

Article Computer Science, Information Systems

Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement

Zhengjun Jing et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Software Engineering

Improved collusion-resisting secure nearest neighbor query over encrypted data in cloud

Youwen Zhu et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2019)

Article Computer Science, Information Systems

Differentially private Naive Bayes learning over multiple data sources

Tong Li et al.

INFORMATION SCIENCES (2018)

Article Computer Science, Information Systems

A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage

Run Xie et al.

SECURITY AND COMMUNICATION NETWORKS (2018)

Article Computer Science, Information Systems

Securely Outsourcing ID3 Decision Tree in Cloud Computing

Ye Li et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2018)

Article Computer Science, Information Systems

Towards secure and flexible EHR sharing in mobile health cloud under static assumptions

Zhaoquan Cai et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2017)