HC
H. Chen
8 records found
1
The Vesper Protocol
Leveraging Zero-Knowledge Proofs and SGX Enclaves in Hyperledger Fabric Smart Contracts
This work explores the feasibility of combining zero-knowledge proofs with SGX enclave protection technology, using the Hyperledger fabric, as the testing environment. The focus is on assessing the viability of this combination in real-world scenarios where post-quantum security
...
One distinguishable feature of file-inject attacks on searchable encryption schemes is the 100% query recovery rate, i.e., confirming the corresponding keyword for each query. The main efficiency consideration of file-injection attacks is the number of injected files. In the work
...
Searchable Symmetric Encryption Attacks
More power with more knowledge
A searchable symmetric encryption (SSE) scheme allows a user to securely perform a keyword search on an encrypted database. This search capability is useful but comes with the price of unintentional information leakage. An attacker abuses leakage to steal confidential information
...
Revisit Attacks on Searchable Symmetric Encryption
Explore More, Reveal More
Searchable Symmetric Encryption (SSE) schemes provide secure search over encrypted databases while allowing admitted information leakages. Generally, the leakages can be categorized into access, search, and volume pattern. In most existing Searchable Encryption (SE) schemes, thes
...
Attacks on Searchable Symmetric Encryption Systems
Revisiting Similar-data and File Injection Attacks
The amount of data individuals create keeps increasing every year to the point that the data cannot be stored on a single device anymore. Cloud storage provides a solution for this problem, but not everybody wants the cloud storage service providers to peek at their data and they
...
SSE Is Not As Secure As It Looks
New Attacks On Range Queries Using PQ-Trees And Auxiliary Information
In a world where more data gets uploaded to the cloud, it is essential that the data gets stored securely. For users to keep search functionality, searchable symmetric encryption has been developed. SSE works by a user sending a token representing a keyword (or a range), after wh
...
Blockchain networks are increasingly recognized as a disruptive technology across sectors such as online services, finance, supply chain, administration etc. They are underpinned by smart contracts which provide programmatic instruction for the blockchain to operate. A major obst
...
The NIST PQC Standardization Process aims to find new cryptographic standards resistant to both classical and quantum computers. Several categories of cryptographic schemes are currently being evaluated by both NIST and the cryptographic community. Schemes are compared against on
...