H. Chen
16 records found
1
Authored
Updatable encryption (UE) enables the cloud server to update the previously sourced encrypted data to a new key with only an update token received from the client. Two interesting works have been proposed to clarify the relationships among various UE security notions. Jiang (A ...
VAL
Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents
Searchable Encryption schemes provide secure search over encrypted databases while allowing admitted information leakages. Generally, the leakages can be categorized into access and volume pattern. In most existing SE schemes, these leakages are caused by practical designs but ...
Your Smart Contracts Are Not Secure
Investigating Arbitrageurs and Oracle Manipulators in Ethereum
Smart contracts on Ethereum enable billions of dollars to be transacted in a decentralized, transparent and trustless environment. However, adversaries lie await in the Dark Forest, waiting to exploit any and all smart contract vulnerabilities in order to extract profits from ...
Contributed
The Vesper Protocol
Leveraging Zero-Knowledge Proofs and SGX Enclaves in Hyperledger Fabric Smart Contracts
Searchable Symmetric Encryption Attacks
More power with more knowledge
SSE Is Not As Secure As It Looks
New Attacks On Range Queries Using PQ-Trees And Auxiliary Information
Attacks on Searchable Symmetric Encryption Systems
Revisiting Similar-data and File Injection Attacks
Revisit Attacks on Searchable Symmetric Encryption
Explore More, Reveal More
standardize new quantum-resista ...