- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Chaos-based Image/Signal Encryption
- Complexity and Algorithms in Graphs
- Cloud Data Security Solutions
- Cryptographic Implementations and Security
- Blockchain Technology Applications and Security
- Hydrological Forecasting Using AI
- Internet Traffic Analysis and Secure E-voting
- Coding theory and cryptography
- Security and Verification in Computing
- Advanced Steganography and Watermarking Techniques
- Cryptography and Residue Arithmetic
- Hydrology and Watershed Management Studies
- Caching and Content Delivery
- Vehicular Ad Hoc Networks (VANETs)
- Energy Load and Power Forecasting
- Water Quality Monitoring Technologies
- Advanced Authentication Protocols Security
- Network Packet Processing and Optimization
- Mobile Ad Hoc Networks
- Machine Learning and ELM
- UAV Applications and Optimization
- Spam and Phishing Detection
- Biometric Identification and Security
Shanghai Jiao Tong University
2015-2025
North China University of Water Resources and Electric Power
2023-2024
Monash University
2017-2023
Data61
2018-2020
Commonwealth Scientific and Industrial Research Organisation
2018-2020
The University of Melbourne
2017
State Key Laboratory of Networking and Switching Technology
2010
Beijing University of Posts and Telecommunications
2009-2010
Symmetric Searchable Encryption (SSE) has received wide attention due to its practical application in searching on encrypted data. Beyond search, data addition and deletion are also supported dynamic SSE schemes. Unfortunately, these update operations leak some information of updated To address this issue, forward-secure is actively explored protect the relations newly previously searched keywords. On contrary, little work been done backward security, which enforces that search should not...
The recently proposed Oblivious Cross-Tags (OXT) protocol (CRYPTO 2013) has broken new ground in designing efficient searchable symmetric encryption (SSE) with support for conjunctive keyword search a single-writer single-reader framework. While the OXT offers high performance by adopting number of specialised data-structures, it also trades-off security leaking 'partial' database information to server. Recent attacks have exploited similar partial leakage breach confidentiality....
In Dynamic Symmetric Searchable Encryption (DSSE), forward privacy ensures that previous search queries cannot be associated with future updates, while backward guarantees subsequent deleted documents in the past.In this work, we propose a generic and backward-private DSSE scheme, which is, to best of our knowledge, first practical non-interactive Type-II scheme not relying on trusted execution environments.To end, introduce new cryptographic primitive, named Revocable (SRE), modular...
Abstract The accurate prediction of monthly runoff in the lower reaches Yellow River is crucial for rational utilization regional water resources, optimal allocation, and flood prevention. This study proposes a VMD-SSA-BiLSTM coupled model volume prediction, which combines advantages Variational Modal Decomposition (VMD) signal decomposition preprocessing, Sparrow Search Algorithm (SSA) BiLSTM parameter optimization, Bi-directional Long Short-Term Memory Neural Network (BiLSTM) exploiting...
The immutability of blockchain is crucial to the security many applications, while it still desired or even legally obliged allow for redacting contents some scenarios. In this work, we revisit conflict between and redaction blockchain, put forward a new fine-grained redactable with semi-trusted regulator, who follows our protocol but has tendency abuse his power. To best knowledge, first that not only supports supervision content, also allows users themselves manage their own data. end,...
Searchable Encryption (SE) enables a data owner to outsource encrypted an untrusted server while preserving the keyword search functionality. Typically, learns whether or not query has been performed more than once, which is usually called pattern. However, such kind of information leakage might be leveraged break privacy. To further reduce type and provide strong privacy guarantee, Wang <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">et...
In this article, we introduce a new mechanism for constructing multi-client searchable encryption (SE). By tactfully leveraging the RSA-function, propose first SE protocol that successfully avoids per-query interaction between data owner and client. Therefore, our approach significantly reduces communication cost by eliminating need to authorize client queries at all times. To be compatible with RSA-based approach, also present deterministic memory-efficient ‘keyword prime’...
Due to its capabilities of searches and updates over the encrypted database, dynamic searchable symmetric encryption (DSSE) has received considerable attention recently. To resist leakage abuse attacks, a secure DSSE scheme usually requires forward backward privacy. However, existing private schemes either only support single keyword queries or require more interactions between client server. In this article, we first give new function for range queries, which is complicated than one...
Encrypted multi-map (EMM), as a special case of structured encryption, has attracted extensive attention recently. However, most EMM constructions reveal the real volumes queried keys, which can be leveraged to launch leakage-abuse attacks, demonstrated by Kellaris et al. in CCS 2016 and Kornaropoulos S&P 2021.
E-medical records are sensitive and should be stored in a medical database encrypted form. However, simply encrypting these will eliminate data utility interoperability of the existing system because no longer searchable. Moreover, multiple authorities could involved controlling sharing private clients. authorizing different clients to search access originating from secure scalable manner is nontrivial matter. To address above issues, we propose an authorized searchable encryption scheme...
In this paper, we propose GraphSE\textsuperscript2, an encrypted graph database for online social network services to address massive data breaches. GraphSE\textsuperscript2 ~preserves the functionality of search, a key enabler quality services, where search queries are conducted on large-scale and meanwhile perform set computational operations user-generated contents. To enable efficient privacy-preserving ~provides structural model facilitate parallel access. It is also designed decompose...
Abstract To improve the accuracy of runoff forecasting, a combined forecasting model is established by using kernel extreme learning machine (KELM) algorithm optimised butterfly optimisation (BOA), with variational modal decomposition method (VMD) and complementary ensemble empirical (CEEMD), for measured daily sequences at Jiehetan Huayuankou stations Gaochun Lijin stations. The results show that VMD-CEEMD-BOA-KELM predicts best. average absolute errors are 30.02, 23.72, 25.75, 29.37, root...
This article presents two dynamic symmetric searchable encryption schemes for geometric range search. Our constructions are the first to provide forward/backward security in context of SSE-based supporting Besides, we define a notion called content privacy. captures leakages that critical search but not considered by security. Content privacy eliminates leakage on updated points database during both and update. Due inherent associated with queries, none existing related works can support...
Data deduplication is of vital importance for mobile cloud computing to cope with the explosive growth outsourced data. In order ensure privacy sensitive data against an untrusted cloud, Message-Locked Encryption (MLE) has been proposed enable over ciphertext. However, MLE prohibits access control since it uses deterministic content-derived encryption keys. Recently, a lightweight rekeying-aware encrypted system (REED) achieve dynamic secure deduplication. REED vulnerable key-retaining...