样式: 排序: IF: - GO 导出 标记为已读
-
Attackers Are Not the Same! Unveiling the Impact of Feature Distribution on Label Inference Attacks IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-11-14 Yige Liu, Che Wang, Yiwei Lou, Yongzhi Cao, Hanpin Wang
-
Backdoor Online Tracing With Evolving Graphs IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-11-13 Chengyu Jia, Jinyin Chen, Shouling Ji, Yao Cheng, Haibin Zheng, Qi Xuan
-
LHADRO: A Robust Control Framework for Autonomous Vehicles Under Cyber-Physical Attacks IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-11-13 Jiachen Yang, Jipeng Zhang
-
Towards Mobile Palmprint Recognition via Multi-view Hierarchical Graph Learning IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-11-13 Shuping Zhao, Lunke Fei, Bob Zhang, Jie Wen, Jinrong Cui
-
Succinct Hash-based Arbitrary-Range Proofs IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-11-13 Weihan Li, Zongyang Zhang, Yanpei Guo, Sherman S. M. Chow, Zhiguo Wan
-
Lightweight 0-RTT Session Resumption Protocol for Constrained Devices IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-11-13 Jianghong Wei, Guohua Tian, Xiaofeng Chen, Willy Susilo
-
Strtune: Data Dependence-Based Code Slicing for Binary Similarity Detection With Fine-Tuned Representation IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-11-12 Kaiyan He, Yikun Hu, Xuehui Li, Yunhao Song, Yubo Zhao, Dawu Gu
-
SecBNN: Efficient Secure Inference on Binary Neural Networks IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-11-12 Hanxiao Chen, Hongwei Li, Meng Hao, Jia Hu, Guowen Xu, Xilin Zhang, Tianwei Zhang
-
Key Schedule Guided Persistent Fault Attack IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-11-11 Xue Gong, Fan Zhang, Xinjie Zhao, Jie Xiao, Shize Guo
-
Load-Balanced Server-Aided MPC in Heterogeneous Computing IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-11-08 Yibiao Lu, Bingsheng Zhang, Kui Ren
-
Image Steganalysis Based on Dual-Path Enhancement and Fractal Downsampling IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-11-07 Tong Fu, Liquan Chen, Yinghua Jiang, Ju Jia, Zhangjie Fu
-
Online Writer Retrieval with Chinese Handwritten Phrases: A Synergistic Temporal-Frequency Representation Learning Approach IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-11-07 Peirong Zhang, Lianwen Jin
-
DEFending Integrated Circuit Layouts IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-11-06 Jitendra Bhandari, Jayanth Gopinath, Mohammed Ashraf, Johann Knechtel, Ozgur Sinanoglu, Ramesh Karri
-
PointNCBW: Towards Dataset Ownership Verification for Point Clouds via Negative Clean-label Backdoor Watermark IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-11-06 Cheng Wei, Yang Wang, Kuofeng Gao, Shuo Shao, Yiming Li, Zhibo Wang, Zhan Qin
-
Communication Efficient Ciphertext-Field Aggregation in Wireless Networks via Over-the-Air Computation IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-11-05 Xin Xie, Jianan Hong, Cunqinq Hua, Yanhong Xu
-
LD-PA: Distilling Univariate Leakage for Deep Learning-based Profiling Attacks IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-11-04 Chong Xiao, Ming Tang, Sengim Karayalcin, Wei Cheng
-
Evaluating Security and Robustness for Split Federated Learning against Poisoning Attacks IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-11-04 Xiaodong Wu, Henry Yuan, Xiangman Li, Jianbing Ni, Rongxing Lu
-
SemantiChain: A Trust Retrieval Blockchain based on Semantic Sharding IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-11-04 Zihang Zhen, Xiaoding Wang, Xu Yang, Jiwu Shu, Jia Hu, Hui Lin, Xun Yi
-
Homomorphic Matrix Operations under Bicyclic Encoding IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-11-04 Jingwei Chen, Linhan Yang, Wenyuan Wu, Yang Liu, Yong Feng
-
IEEE Transactions on Information Forensics and Security publication information IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-11-01
-
ASRL: Adaptive Swarm Reinforcement Learning For Enhanced OSN Intrusion Detection IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-11-01 Edward Kwadwo Boahen, Rexford Nii Ayitey Sosu, Selasi Kwame Ocansey, Qinbao Xu, Changda Wang
-
LAN: Learning Adaptive Neighbors for Real-Time Insider Threat Detection IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-31 Xiangrui Cai, Yang Wang, Sihan Xu, Hao Li, Ying Zhang, Zheli Liu, Xiaojie Yuan
-
An Interpretable Generalization Mechanism for Accurately Detecting Anomaly and Identifying Networking Intrusion Techniques IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-31 Hao-Ting Pai, Yu-Hsuan Kang, Wen-Cheng Chung
-
Rebuttal to ‘On the Unforgeability of “Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET” ’ IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-30 Yafang Yang, Lei Zhang, Yunlei Zhao, Kim-Kwang Raymond Choo, Yan Zhang
-
TriAssetRank: Ranking Vulnerabilities, Exploits, and Privileges for Countermeasures Prioritization IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-30 Aymar Le Père Tchimwa Bouom, Jean-Pierre Lienou, Wilson Ejuh Geh, Frederica Free Nelson, Sachin Shetty, Charles Kamhoua
-
A New Shift-Add Secret Sharing Scheme for Partial Data Protection with Parallel Zigzag Decoding IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-30 Jiajun Chen, Yichen Shen, Chi Wan Sung
-
Eyes on Federated Recommendation: Targeted Poisoning with Competition and Its Mitigation IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-30 Yurong Hao, Xihui Chen, Wei Wang, Jiqiang Liu, Tao Li, Junyong Wang, Witold Pedrycz
-
Robust Tracking-Based PHY-Authentication in mmWave MIMO Systems IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-30 Liza Afeef, Haji M. Furqan, Hüseyin Arslan
-
Ruyi: A Configurable and Efficient Secure Multi-Party Learning Framework with Privileged Parties IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-30 Lushan Song, Zhexuan Wang, Guopeng Lin, Weili Han
-
Resource Allocation for STAR-RIS-Assisted MIMO Physical-Layer Key Generation IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-30 Zheng Wan, Kexin Liu, Yajun Chen, Kaizhi Huang, Hui-Ming Wang, Zheng Chu, Ming Yi, Liang Jin
-
Secure and Efficient Federated Learning via Novel Authenticable Multi-Party Computation and Compressed Sensing IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-25 Lvjun Chen, Di Xiao, Xiangli Xiao, Yushu Zhang
-
Distributed Robust Artificial-Noise-Aided Secure Precoding for Wiretap MIMO Interference Channels IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-25 Zhengmin Kong, Jing Song, Shaoshi Yang, Li Gan, Weizhi Meng, Tao Huang, Sheng Chen
We propose a distributed artificial noise-assisted precoding scheme for secure communications over wiretap multi-input multi-output (MIMO) interference channels, where K legitimate transmitter-receiver pairs communicate in the presence of a sophisticated eavesdropper having more receive-antennas than the legitimate user. Realistic constraints are considered by imposing statistical error bounds for
-
Practical Searchable Symmetric Encryption for Arbitrary Boolean Query-Join in Cloud Storage IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-24 Jiawen Wu, Kai Zhang, Lifei Wei, Junqing Gong, Jianting Ning
Secure cloud storage offers encrypted databases outsourcing service for resource-constrained clients, containing numerous tables with certain relations. Searchable symmetric encryption enables a client to search over its encrypted database on the cloud, while rarely considering queries over joins of tables. Join Cross-Tags (JXT) protocol (ASIACRYPT 2022) is thence presented that enables conjunctive
-
Category-Conditional Gradient Alignment for Domain Adaptive Face Anti-Spoofing IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-24 Yan He, Fei Peng, Rizhao Cai, Zitong Yu, Min Long, Kwok-Yan Lam
In view of inconsistent face acquisition procedure in face anti-spoofing, the detection performance on the target domain generally suffers severe degradation under source-specific gradient optimization. Existing domain adaptation face anti-spoofing methods focus on improving model generalization capability through feature matching, which do not consider the gradient discrepancy between the source and
-
Color Image Steganalysis Based on Pixel Difference Convolution and Enhanced Transformer With Selective Pooling IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-24 Kangkang Wei, Weiqi Luo, Jiwu Huang
Current deep learning-based steganalyzers often depend on specific image dimensions, leading to inevitable adjustments in network structure when dealing with varied image sizes. This impedes their effectiveness in managing the wide range of image sizes commonly found on social media. To address this issue, our paper presents a novel steganalytic network that is optimized for fixed-size (notably, $256\times
-
Advancing Voice Biometrics for Dysarthria Speakers Using Multitaper LFCC and Voice Conversion Data Augmentation IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-23 Shinimol Salim, Waquar Ahmad
Patients with dysarthria and physical impairments face challenges with traditional user interfaces. An Automatic Speaker Verification (ASV) system can enhance accessibility by replacing complex authentication methods and enabling voice biometrics in various applications for patients with dysarthria. This study focuses on enhancing accessibility of patients with dysarthria through an ASV system. In
-
A Practical Federated Learning Framework with Truthful Incentive in UAV-Assisted Crowdsensing IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-23 Liang Xie, Zhou Su, Yuntao Wang, Zhendong Li
-
The Capacity Region of Distributed Multi-User Secret Sharing Under Perfect Secrecy IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-23 Jiahong Wu, Nan Liu, Wei Kang
We study the problem of distributed multi-user secret sharing (DMUSS), involving a main node, N storage nodes, and K users. Every user has access to the contents of a certain subset of storage nodes and wants to decode an independent secret message. With knowledge of K secret messages, the main node strategically places encoded shares in the storage nodes, ensuring two crucial conditions: (i) each
-
Secure Beamforming and Radar Association in CoMP-NOMA Empowered Integrated Sensing and Communication Systems IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-23 Liang Guo, Jie Jia, Jian Chen, Shuhui Yang, Xingwei Wang
-
PAESS: Public-Key Authentication Encryption With Similar Data Search for Pay-Per-Query IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-21 Liqing Chen, Jiayi Li, Jiguo Li, Jian Weng
In recent years, many cloud service providers adopt the pay-per-query model to offer paid search services to the public. The data owner rents the resources of cloud service providers and charges the data user a fee based on the data volume to be queried. While this commercial model offers flexibility, convenience, and cost-effectiveness, it comes with a significant vulnerability to data breaches. Public-key
-
2DynEthNet: A Two-Dimensional Streaming Framework for Ethereum Phishing Scam Detection IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-21 Jingjing Yang, Wenjia Yu, Jiajing Wu, Dan Lin, Zhiying Wu, Zibin Zheng
In recent years, phishing scams have emerged as one of the most serious crimes on Ethereum. Existing phishing scam detection methods typically model public transaction records on the blockchain as a graph, and then identify phishing addresses through manual feature extraction or graph learning frameworks. Meanwhile, these methods model transactions within a period as a static network for analysis.
-
Bringing Smart Contract Confidentiality via Trusted Hardware: Fact and Fiction IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-21 Rujia Li, Qin Wang, Yuanzhao Li, Sisi Duan, Qi Wang, David Galindo
-
EMSim+: Accelerating Electromagnetic Security Evaluation With Generative Adversarial Network and Transfer Learning IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-18 Ya Gao, Haocheng Ma, Qizhi Zhang, Xintong Song, Yier Jin, Jiaji He, Yiqiang Zhao
Electromagnetic side-channel analysis (EM SCA) attack poses a serious threat to integrated circuits (ICs), necessitating timely vulnerability detection before deployment to enhance EM side-channel security. Various EM simulation methods have emerged for analyzing EM side-channel leakage, providing sufficiently accurate results. However, these simulator-based methods still face two principal challenges
-
Graph-Signal-to-Graph Matching for Network De-Anonymization Attacks IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-18 Hang Liu, Anna Scaglione, Sean Peisert
Graph matching over two given graphs is a well-established method for re-identifying obscured node labels within an anonymous graph by matching the corresponding nodes in a reference graph. This paper studies a new application, termed the graph-signal-to-graph matching (GS2GM) problem, where the attacker observes a set of filtered graph signals originating from a hidden graph. These signals are generated
-
A Two-Stage Approach for Fair Data Trading Based on Blockchain IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-17 Fei Chen, Haohui Zhang, Tao Xiang, Joseph K. Liu
How to enable fairness for e-commerce applications has attracted years of research. Recent research has proposed employing blockchain smart contract as an efficient trusted third party (TTP) to enable fair data trading. However, the state-of-the-art schemes suffer from two issues, i.e., they either fail to work for situations where data validity cannot be encoded as an oracle function in the smart
-
Joint Variational Modal Decomposition for Specific Emitter Identification With Multiple Sensors IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-17 Xiaofang Chen, Xue Fu, Wenbo Xu, Yue Wang, Guan Gui
Specific emitter identification (SEI) is important to guarantee the security of device administration. Recently, to increase the effectiveness of the recognition, traditional SEI employing only one sensor has been extended to the scenario with multiple sensors. However, the inherent distortion at different sensors impacts the radio frequency fingerprints (RFFs) of the emitter independently, which inevitably
-
Cross-Domain Inner-Product Access Control Encryption for Secure EMR Flow in Cloud Edge IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-17 Caiqun Shi, Qinlong Huang, Rui Jian, Genghui Chi
The quality of medical services is improved by sharing electronic medical records (EMRs) across multiple medical institutions via cloud edge. However, EMRs contain private information about patients, and cloud servers are untrustworthy, thus they cannot be shared arbitrarily among senders and receivers. Access control encryption (ACE) is a preferred technique that produces encrypted EMRs and then restricts
-
KG-IBL: Knowledge Graph Driven Incremental Broad Learning for Few-Shot Specific Emitter Identification IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-16 Minyu Hua, Yibin Zhang, Qianyun Zhang, Huaiyu Tang, Lantu Guo, Yun Lin, Hikmet Sari, Guan Gui
Specific emitter identification (SEI) plays a crucial role in the security of the Industrial Internet of Things (IIoT). In recent years, research on applying deep learning (DL) methods for signal identification has mushroomed. However, DL-based SEI methods rely on a huge amount of training data and powerful computing devices, limiting their application scenarios. In addition, DL models are considered
-
Enhancing Covert Communication in OOK Schemes by Phase Deflection IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-14 Xiaopeng Ji, Ruizhi Zhu, Qiaosheng Zhang, Chunguo Li, Daming Cao
This work proposes an On-Off Keying (OOK) coding scheme for covert communication over complex Gaussian channels. In particular, a transmitter Alice employs phase deflection to covertly transmit information to a receiver Bob, simultaneously ensuring that the communication intent is concealed from a warden Willie. The utilization of phase deflection allows Alice to improve the transmission rate by leveraging
-
Generating Location Traces With Semantic- Constrained Local Differential Privacy IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-14 Xinyue Sun, Qingqing Ye, Haibo Hu, Jiawei Duan, Qiao Xue, Tianyu Wo, Weizhe Zhang, Jie Xu
Valuable information and knowledge can be learned from users’ location traces and support various location-based applications such as intelligent traffic control, incident response, and COVID-19 contact tracing. However, due to privacy concerns, no authority could simply collect users’ private location traces for mining or even publishing. To echo such concerns, local differential privacy (LDP) enables
-
MBBFAuth: Multimodal Behavioral Biometrics Fusion for Continuous Authentication on Non-Portable Devices IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-14 Jiajia Li, Qian Yi, Ming K. Lim, Shuping Yi, Pengxing Zhu, Xingjun Huang
Continuous authentication based on behavioral biometrics is effective and crucial as user behaviors are not easily copied. However, relying solely on one behavioral biometric limits the accuracy of continuous authentication. Therefore, a continuous authentication system based on multimodal behavioral biometrics fusion is proposed in this study, which fuses three modalities: contextual behavior, mouse
-
Blockchain-Based Covert Communication: A Detection Attack and Efficient Improvement IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-11 Zhuo Chen, Liehuang Zhu, Peng Jiang, Zijian Zhang, Chengxiang Si
Covert channels in blockchain networks achieve undetectable and reliable communication, while transactions incorporating secret data are perpetually stored on the chain, thereby leaving the secret data continuously susceptible to extraction. MTMM (IEEE Transactions on Computers 2023) is a state-of-the-art blockchain-based covert channel. It utilizes Bitcoin network traffic that will not be recorded
-
No-Box Universal Adversarial Perturbations Against Image Classifiers via Artificial Textures IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-11 Ningping Mou, Binqing Guo, Lingchen Zhao, Cong Wang, Yue Zhao, Qian Wang
Recent advancements in adversarial attack research have seen a transition from white-box to black-box and even no-box threat models, greatly enhancing the practicality of these attacks. However, existing no-box attacks focus on instance-specific perturbations, leaving more powerful universal adversarial perturbations (UAPs) unexplored. This study addresses a crucial question: can UAPs be generated
-
Mitigating Propagation of Cyber-Attacks in Wide-Area Measurement Systems IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-11 Hamed Sarjan, Mohammadmahdi Asghari, Amir Ameli, Mohsen Ghafouri
Wide Area Measurement Systems (WAMSs) are used in power networks to improve the situational awareness of the operator, as well as to facilitate real-time control and protection decisions. In WAMSs, Phasor Data Concentrators (PDCs) collect time-synchronized data of Phasor Measurement Units (PMUs) through the communication system, and direct it to the control center to be used in wide-area control and
-
Mean Estimation of Numerical Data Under (ϵ,δ) -Utility-Optimized Local Differential Privacy IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-11 Yue Zhang, Youwen Zhu, Shaowei Wang, Xiaohua Huang
Utility-optimized local differential privacy (ULDP) considers input domain including non-sensitive values which reduces utility loss by leaking some non-sensitive values, without lowering protection to any sensitive one compared with local differential privacy (LDP). The existing ULDP mechanisms are designed under $\epsilon $ -ULDP which preserve sensitive values under $\epsilon $ -LDP. Nevertheless
-
OpenVFL: A Vertical Federated Learning Framework With Stronger Privacy-Preserving IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-10 Yunbo Yang, Xiang Chen, Yuhao Pan, Jiachen Shen, Zhenfu Cao, Xiaolei Dong, Xiaoguo Li, Jianfei Sun, Guomin Yang, Robert Deng
Federated learning (FL) allows multiple parties, each holding a dataset, to jointly train a model without leaking any information about their own datasets. In this paper, we focus on vertical FL (VFL). In VFL, each party holds a dataset with the same sample space and different feature spaces. All parties should first agree on the training dataset in the ID alignment phase. However, existing works may
-
CareFL: Contribution Guided Byzantine-Robust Federated Learning IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-10 Qihao Dong, Shengyuan Yang, Zhiyang Dai, Yansong Gao, Shang Wang, Yuan Cao, Anmin Fu, Willy Susilo
Byzantine-robust federated learning (FL) endeavors to empower service providers in acquiring a precise global model, even in the presence of potentially malicious FL clients. While considerable strides have been taken in the development of robust aggregation algorithms for FL in recent years, their efficacy is confined to addressing particular forms of Byzantine attacks, and they exhibit vulnerabilities
-
Boosting Accuracy of Differentially Private Continuous Data Release for Federated Learning IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-09 Jianping Cai, Qingqing Ye, Haibo Hu, Ximeng Liu, Yanggeng Fu
-
Lattice-Based Conditional Privacy-Preserving Batch Authentication Protocol for Fog-Assisted Vehicular Ad Hoc Networks IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-09 Long Li, Chingfang Hsu, Man Ho Au, Jianqun Cui, Lein Harn, Zhuo Zhao
The vehicular ad hoc network (VANET) is a basic component of intelligent transportation systems. Due to the growing security and privacy-preserving requirements of the VANET, a lot of conditional privacy-preserving authentication (CPPA) protocols have been proposed in recent years. Unfortunately, the traditional CPPA protocols, which are based on a trusted authority (TA) and rely solely on classical
-
Secret Cracking and Security Enhancement for the Image Application of CRT-Based Secret Sharing IEEE Trans. Inform. Forensics Secur. (IF 6.3) Pub Date : 2024-10-09 Rui Wang, Longlong Li, Guozheng Yang, Xuehu Yan, Wei Yan
The Asmuth and Bloom threshold secret sharing (AB-SS) is a classical introduction of the Chinese remainder theorem (CRT) to secret sharing, offering low computational complexity compared to other branches of secret sharing. For decades, numerous schemes have been proposed for practical applications of AB-SS, such as secret image sharing (SIS). However, in terms of security, AB-SS has proved to be neither