A survey on cryptographic techniques for protecting big data security: present and forthcoming
S Lu, J Zheng, Z Cao, Y Wang, C Gu - Science China Information …, 2022 - Springer
Big data drive multidimensional convergence and profound innovations among industries
and provide novel ways of exploring the world. As they significantly create economic and …
and provide novel ways of exploring the world. As they significantly create economic and …
Three lessons from threema: Analysis of a secure messenger
We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted
messaging application with more than 10 million users and 7000 corporate customers. We …
messaging application with more than 10 million users and 7000 corporate customers. We …
Efficient schemes for committing authenticated encryption
This paper provides efficient authenticated-encryption (AE) schemes in which a ciphertext is
a commitment to the key. These are extended, at minimal additional cost, to schemes where …
a commitment to the key. These are extended, at minimal additional cost, to schemes where …
{Zero-Knowledge} Middleboxes
This paper initiates research on zero-knowledge middleboxes (ZKMBs). A ZKMB is a
network middlebox that enforces network usage policies on encrypted traffic. Clients send …
network middlebox that enforces network usage policies on encrypted traffic. Clients send …
On-demand Container Loading in {AWS} Lambda
M Brooker, M Danilov, C Greenwood… - 2023 USENIX Annual …, 2023 - usenix.org
AWS Lambda is a serverless event-driven compute service, part of a category of cloud
compute offerings sometimes called Function-as-a-service (FaaS). When we first released …
compute offerings sometimes called Function-as-a-service (FaaS). When we first released …
Anonymous, robust post-quantum public key encryption
A core goal of the NIST PQC competition is to produce PKE schemes which, even if attacked
with a large-scale quantum computer, maintain the security guarantees needed by …
with a large-scale quantum computer, maintain the security guarantees needed by …
On committing authenticated-encryption
We provide a strong definition for committing authenticated-encryption (cAE), as well as a
framework that encompasses earlier and weaker definitions. The framework attends not only …
framework that encompasses earlier and weaker definitions. The framework attends not only …
Key rotation for authenticated encryption
A common requirement in practice is to periodically rotate the keys used to encrypt stored
data. Systems used by Amazon and Google do so using a hybrid encryption technique …
data. Systems used by Amazon and Google do so using a hybrid encryption technique …
Identifying harmful media in {End-to-End} encrypted communication: Efficient private membership computation
A Kulshrestha, J Mayer - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
End-to-end encryption (E2EE) poses a challenge for automated detection of harmful media,
such as child sexual abuse material and extremist content. The predominant approach at …
such as child sexual abuse material and extremist content. The predominant approach at …
MEGA: malleable encryption goes awry
M Backendal, M Haller… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
MEGA is a leading cloud storage platform with more than 250 million users and 1000
Petabytes of stored data. MEGA claims to offer user-controlled, end-to-end security. This is …
Petabytes of stored data. MEGA claims to offer user-controlled, end-to-end security. This is …