Special Focus on Security and Privacy in Blockchain-based Applications
计算机 信息安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 17

Blockchain-based multiple groups data sharing with anonymity and traceability
Huang, Hui; Chen, Xiaofeng; Wang, Jianfeng
Sci China Inf Sci, 2020, 63(3): 130101
Keywords: multiple groups; data sharing; blockchain; anonymity; traceability
Cite as: Huang H, Chen X F, Wang J F. Blockchain-based multiple groups data sharing with anonymity and traceability. Sci China Inf Sci, 2020, 63(3): 130101, doi: 10.1007/s11432-018-9781-0

计算机 信息安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 16

Hybrid malware detection approach with feedback-directed machine learning
Li, Zhetao; Li, Wenlin; Lin, Fuyuan; Sun, Yi; Yang, Min; Zhang, Yuan; Wang, Zhibo
Sci China Inf Sci, 2020, 63(3): 139103
Keywords: malware detection; hybrid approach; android; machine learning; security
Cite as: Li Z T, Li W L, Lin F Y, et al. Hybrid malware detection approach with feedback-directed machine learning. Sci China Inf Sci, 2020, 63(3): 139103, doi: 10.1007/s11432-018-9615-8

Special Focus on Security and Privacy in Blockchain-based Applications
计算机 信息安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 14

SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system
Lin, Chao; He, Debiao; Zeadally, Sherali; Kumar, Neeraj; Choo, Kim-Kwang Raymond
Sci China Inf Sci, 2020, 63(3): 130102
Keywords: crowdsourcing; blockchain; secure; privacy-preserving; smart contract
Cite as: Lin C, He D B, Zeadally S, et al. SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system. Sci China Inf Sci, 2020, 63(3): 130102, doi: 10.1007/s11432-019-9893-2

计算机 信息安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 10

Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering
Zheng, Baokun; Zhu, Liehuang; Shen, Meng; Du, Xiaojiang; Guizani, Mohsen
Sci China Inf Sci, 2020, 63(3): 132101
Keywords: privacy; blockchain; bitcoin; transaction; cluster
Cite as: Zheng B K, Zhu L H, Shen M, et al. Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering. Sci China Inf Sci, 2020, 63(3): 132101, doi: 10.1007/s11432-019-9900-9

计算机 信息安全 REVIEW Website SpringerLink Google Scholar Cited in SCI: 8

Stream cipher designs: a review
Jiao, Lin; Hao, Yonglin; Feng, Dengguo
Sci China Inf Sci, 2020, 63(3): 131101
Keywords: stream cipher; survey; lightweight; authenticated encryption; homomorphic encryption
Cite as: Jiao L, Hao Y L, Feng D G. Stream cipher designs: a review. Sci China Inf Sci, 2020, 63(3): 131101, doi: 10.1007/s11432-018-9929-x

计算机 信息安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 6

PPLS: a privacy-preserving location-sharing scheme in mobile online social networks
Xu, Chang; Xie, Xuan; Zhu, Liehuang; Sharif, Kashif; Zhang, Chuan; Du, Xiaojiang; Guizani, Mohsen
Sci China Inf Sci, 2020, 63(3): 132105
Keywords: privacy-preservation; location-sharing; mobile online social networks
Cite as: Xu C, Xie X, Zhu L H, et al. PPLS: a privacy-preserving location-sharing scheme in mobile online social networks. Sci China Inf Sci, 2020, 63(3): 132105, doi: 10.1007/s11432-019-1508-6

计算机 信息安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 5

Permutation polynomials x(2k+1+3) + ax(2k+2) + bx over F-22k and their differential uniformity
Peng, Jie; Zheng, Lijing; Wu, Chunsheng; Kan, Haibin
Sci China Inf Sci, 2020, 63(10): 209101
Keywords: finite fields; permutation polynomial; binomial; trinomial; differential uniformity
Cite as: Peng J, Zheng L J, Wu C S, et al. Permutation polynomials x(2k+1+3) + ax(2k+2) + bx over F-22k and their differential uniformity. Sci China Inf Sci, 2020, 63(10): 209101, doi: 10.1007/s11432-018-9741-6

Special Focus on Security and Privacy in Blockchain-based Applications
计算机 信息安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 4

A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes
Zhou, Lu; Ge, Chunpeng; Su, Chunhua
Sci China Inf Sci, 2020, 63(3): 130103
Keywords: spv nodes; secure authentication; two-factor; bitcoin
Cite as: Zhou L, Ge C P, Su C H. A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes. Sci China Inf Sci, 2020, 63(3): 130103, doi: 10.1007/s11432-019-9922-x

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 4

Image processing operations identification via convolutional neural network
Chen, Bolin; Li, Haodong; Luo, Weiqi; Huang, Jiwu
Sci China Inf Sci, 2020, 63(3): 139109
Keywords: image forensics; image operation classification; convolutional neural network; cnn; steganalysis; universal forensics
Cite as: Chen B L, Li H D, Luo W Q, et al. Image processing operations identification via convolutional neural network. Sci China Inf Sci, 2020, 63(3): 139109, doi: 10.1007/s11432-018-9492-6

Special Focus on Security and Privacy in Blockchain-based Applications
计算机 信息安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 3

Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers
Yuan, Quan; Wei, Puwen; Jia, Keting; Xue, Haiyang
Sci China Inf Sci, 2020, 63(3): 130104
Keywords: blockchain; bitcoin; random oracle; delay; consensus protocol
Cite as: Yuan Q, Wei P W, Jia K T, et al. Analysis of blockchain protocol against static adversarial miners corrupted by long delay attackers. Sci China Inf Sci, 2020, 63(3): 130104, doi: 10.1007/s11432-019-9916-5

计算机 信息安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 2

New insights on linear cryptanalysis
Liu, Zhiqiang; Han, Shuai; Wang, Qingju; Li, Wei; Liu, Ya; Gu, Dawu
Sci China Inf Sci, 2020, 63(1): 112104
Keywords: block cipher; linear cryptanalysis; differential-linear cryptanalysis; correlation distribution; key-dependent differential-linear hull
Cite as: Liu Z Q, Han S, Wang Q J, et al. New insights on linear cryptanalysis. Sci China Inf Sci, 2020, 63(1): 112104, doi: 10.1007/s11432-018-9758-4

计算机 信息安全 RESEARCH PAPER Website SpringerLink Google Scholar Supplementary Cited in SCI: 2

An enhanced searchable encryption scheme for secure data outsourcing
Zhang, Rui; Wang, Jiabei; Song, Zishuai; Wang, Xi
Sci China Inf Sci, 2020, 63(3): 132102
Keywords: secure data outsourcing; (offline) outside and inside keyword guessing attack; secure channel free peks; conjunctive keyword search; server-aided scheme; standard model
Cite as: Zhang R, Wang J B, Song Z S, et al. An enhanced searchable encryption scheme for secure data outsourcing. Sci China Inf Sci, 2020, 63(3): 132102, doi: 10.1007/s11432-019-1509-7

计算机 信息安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 2

Weight distribution of two classes of linear codes with a few weights
Song, Yuanlong; Yang, Jing
Sci China Inf Sci, 2020, 63(7): 179103
Keywords: cyclic code; linear code; secret sharing; weight distribution; gauss sum; gaussian period
Cite as: Song Y L, Yang J. Weight distribution of two classes of linear codes with a few weights. Sci China Inf Sci, 2020, 63(7): 179103, doi: 10.1007/s11432-018-9610-9

计算机 信息安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 2

Improved lattice-based CCA2-secure PKE in the standard model
Zhang, Jiang; Yu, Yu; Fan, Shuqin; Zhang, Zhenfeng
Sci China Inf Sci, 2020, 63(8): 182101
Keywords: lattice; public-key encryption; chosen ciphertext security; standard model
Cite as: Zhang J, Yu Y, Fan S Q, et al. Improved lattice-based CCA2-secure PKE in the standard model. Sci China Inf Sci, 2020, 63(8): 182101, doi: 10.1007/s11432-019-9861-3

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 2

Secure two-party SM9 signing
Mu, Yongheng; Xu, Haixia; Li, Peili; Ma, Tianjun
Sci China Inf Sci, 2020, 63(8): 189101
Keywords: sm9; identity-based; two-party signing; key protection; cbdc; elliptic curve; paillier encryption
Cite as: Mu Y H, Xu H X, Li P L, et al. Secure two-party SM9 signing. Sci China Inf Sci, 2020, 63(8): 189101, doi: 10.1007/s11432-018-9589-x

计算机 信息安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 2

Keywords: three-party authentication; key exchange; key compromise impersonation attack; mobile-commerce environments; security analysis
Cite as: Chen T, Li X H, Cheng Q F. An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment. Sci China Inf Sci, 2021, 64(9): 199106, doi: 10.1007/s11432-019-2645-x

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 2

Locally differentially private distributed algorithms for set intersection and union
Xue, Qiao; Zhu, Youwen; Wang, Jian; Li, Xingxin; Zhang, Ji
Sci China Inf Sci, 2021, 64(11): 219101
Keywords: local differential privacy; set intersection; union; randomized response; multiset
Cite as: Xue Q, Zhu Y W, Wang J, et al. Locally differentially private distributed algorithms for set intersection and union. Sci China Inf Sci, 2021, 64(11): 219101, doi: 10.1007/s11432-018-9899-8

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 2

An anonymous key agreement protocol with robust authentication for smart grid infrastructure
Chen, Ting; Cheng, Qingfeng; Li, Xinghua
Sci China Inf Sci, 2022, 65(9): 199101
Keywords: smart grid infrastructure; impersonation attack; perfect forward security; ephemeral key compromise attack; key agreement
Cite as: Chen T, Cheng Q F, Li X H. An anonymous key agreement protocol with robust authentication for smart grid infrastructure. Sci China Inf Sci, 2022, 65(9): 199101, doi: 10.1007/s11432-019-2736-5

计算机 信息安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Intersection-policy private mutual authentication from authorized private set intersection
Wen, Yamin; Zhang, Fangguo; Wang, Huaxiong; Miao, Yinbin; Gong, Zheng
Sci China Inf Sci, 2020, 63(2): 122101
Keywords: private mutual authentication; secret handshake; intersection policy; authorized private set intersection; multi-attribute matching
Cite as: Wen Y M, Zhang F G, Wang H X, et al. Intersection-policy private mutual authentication from authorized private set intersection. Sci China Inf Sci, 2020, 63(2): 122101, doi: 10.1007/s11432-019-9907-x

Special Focus on Security and Privacy in Blockchain-based Applications
计算机 信息安全 EDITORIAL Website SpringerLink Google Scholar Cited in SCI: 1

Special focus on security and privacy in blockchain-based applications
Zhong, Sheng; Huang, Xinyi
Sci China Inf Sci, 2020, 63(3): 130100
Cite as: Zhong S, Huang X Y. Special focus on security and privacy in blockchain-based applications. Sci China Inf Sci, 2020, 63(3): 130100, doi: 10.1007/s11432-020-2781-0

计算机 信息安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

An improved Durandal signature scheme
Song, Yongcheng; Huang, Xinyi; Mu, Yi; Wu, Wei
Sci China Inf Sci, 2020, 63(3): 132103
Keywords: post-quantum cryptography; code-based cryptography; rank metric; digital signatures; provable security
Cite as: Song Y C, Huang X Y, Mu Y, et al. An improved Durandal signature scheme. Sci China Inf Sci, 2020, 63(3): 132103, doi: 10.1007/s11432-019-2670-7

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

An eigenvalue-based immunization scheme for node attacks in networks with uncertainty
Ren, Yizhi; Jiang, Mengjin; Wu, Ting; Yao, Ye; Choo, Kim-Kwang Raymond; Wang, Zhen
Sci China Inf Sci, 2020, 63(3): 139101
Keywords: security; node attacks; immunization strategy; largest eigenvalue; network with uncertainty
Cite as: Ren Y Z, Jiang M J, Wu T, et al. An eigenvalue-based immunization scheme for node attacks in networks with uncertainty. Sci China Inf Sci, 2020, 63(3): 139101, doi: 10.1007/s11432-018-9855-7

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Theoretical analysis of persistent fault attack
Zhang, Fan; Xu, Guorui; Yang, Bolin; Liang, Ziyuan; Ren, Kui
Sci China Inf Sci, 2020, 63(3): 139102
Keywords: fault analysis; persistent fault attack; dmr; ccp; statistical analysis
Cite as: Zhang F, Xu G R, Yang B L, et al. Theoretical analysis of persistent fault attack. Sci China Inf Sci, 2020, 63(3): 139102, doi: 10.1007/s11432-018-9818-y

计算机 信息安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 1

Two-stage index-based central keyword-ranked searches over encrypted cloud data
Zhong, Hong; Li, Zhanfei; Xu, Yan; Chen, Zhili; Cui, Jie
Sci China Inf Sci, 2020, 63(3): 139105
Keywords: cloud computing; two-stage index; central-keyword search; privacy preserving; searchable encryption
Cite as: Zhong H, Li Z F, Xu Y, et al. Two-stage index-based central keyword-ranked searches over encrypted cloud data. Sci China Inf Sci, 2020, 63(3): 139105, doi: 10.1007/s11432-018-9525-y

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Cryptanalysis of the obfuscated round boundary technique for whitebox cryptography
Yeom, Yongjin; Kim, Dong-Chan; Baek, Chung Hun; Shin, Junbum
Sci China Inf Sci, 2020, 63(3): 139106
Keywords: whitebox cryptography; cryptanalysis; aes; block cipher implementation; software security
Cite as: Yeom Y, Kim D-C, Baek C H, et al. Cryptanalysis of the obfuscated round boundary technique for whitebox cryptography. Sci China Inf Sci, 2020, 63(3): 139106, doi: 10.1007/s11432-019-9883-9

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

General construction of revocable identity-based fully homomorphic signature
Xie, Congge; Weng, Jian; Lu, Wei; Hou, Lin
Sci China Inf Sci, 2020, 63(3): 139107
Keywords: revocable identity-based fully homomorphic signature; (2,2) vector secret sharing; short integer solution; standard model; identity-based fully homomorphic signature
Cite as: Xie C G, Weng J, Lu W, et al. General construction of revocable identity-based fully homomorphic signature. Sci China Inf Sci, 2020, 63(3): 139107, doi: 10.1007/s11432-018-9706-0

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Space efficient revocable IBE for mobile devices in cloud computing
Qin, Baodong; Liu, Ximeng; Wei, Zhuo; Zheng, Dong
Sci China Inf Sci, 2020, 63(3): 139110
Keywords: identity-based encryption; server-aided revocation; cloud computing; attribute-based encryption; outsourcing
Cite as: Qin B D, Liu X M, Zhuo W, et al. Space efficient revocable IBE for mobile devices in cloud computing. Sci China Inf Sci, 2020, 63(3): 139110, doi: 10.1007/s11432-018-9455-5

计算机 信息安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 1

STP models of optimal differential and linear trail for S-box based ciphers
Liu, Yu; Liang, Huicong; Li, Muzhou; Huang, Luning; Hu, Kai; Yang, Chenhe; Wang, Meiqin
Sci China Inf Sci, 2021, 64(5): 159103
Keywords: stp; differential trail; linear trail; gift-128; des; desl; iceberg; aria; sm4
Cite as: Liu Y, Liang H C, Li M Z, et al. STP models of optimal differential and linear trail for S-box based ciphers. Sci China Inf Sci, 2021, 64(5): 159103, doi: 10.1007/s11432-018-9772-0

计算机 信息安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 1

Cube attacks on round-reduced MORUS and Gimli
Chen, Siwei; Xiang, Zejun; Zeng, Xiangyong; Zhang, Shasha
Sci China Inf Sci, 2022, 65(1): 119101
Keywords: cube attack; division property; morus; gimli; authenticated encryption
Cite as: Chen S W, Xiang Z J, Zeng X Y, et al. Cube attacks on round-reduced MORUS and Gimli. Sci China Inf Sci, 2022, 65(1): 119101, doi: 10.1007/s11432-019-2742-6

计算机 信息安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 1

Constant-round auction with insulated bidders
Ma, Jie; Qi, Bin; Lv, Kewei
Sci China Inf Sci, 2022, 65(4): 149102
Keywords: auction; commitment; integer comparison protocol; constant-round; blockchain
Cite as: Ma J, Qi B, Lv K W. Constant-round auction with insulated bidders. Sci China Inf Sci, 2022, 65(4): 149102, doi: 10.1007/s11432-019-2666-8

计算机 信息安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 1

Forward and backward secure searchable encryption with multi-keyword search and result verification
Cui, Jie; Sun, Yue; Xu, Yan; Tian, Miaomiao; Zhong, Hong
Sci China Inf Sci, 2022, 65(5): 159102
Keywords: forward security; backward security; multi-keyword search; verification; searchable encryption
Cite as: Cui J, Sun Y, Xu Y, et al. Forward and backward secure searchable encryption with multi-keyword search and result verification. Sci China Inf Sci, 2022, 65(5): 159102, doi: 10.1007/s11432-019-2668-x

计算机 信息安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Polynomial AND homomorphic cryptosystem and applications
Li, Shundong; Zhou, Sufang; Dou, Jiawei; Wang, Wenli
Sci China Inf Sci, 2020, 63(1): 112105
Keywords: polynomial and homomorphic cryptosystem; semigroup; ideal; cloud computing security; cryptography; secure multiparty computation
Cite as: Li S D, Zhou S F, Dou J W, et al. Polynomial AND homomorphic cryptosystem and applications. Sci China Inf Sci, 2020, 63(1): 112105, doi: 10.1007/s11432-018-9789-y

计算机 信息安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Cryptanalysis of PRIMATEs
Li, Yanbin; Wang, Meiqin; Liu, Wenqing; Wang, Wei
Sci China Inf Sci, 2020, 63(1): 112106
Keywords: primates; ape; hanuman; integral distinguisher; key recovery attack; forgery
Cite as: Li Y B, Wang M Q, Liu W Q, et al. Cryptanalysis of PRIMATEs. Sci China Inf Sci, 2020, 63(1): 112106, doi: 10.1007/s11432-019-1507-1

Special Focus on Security and Privacy in Blockchain-based Applications
计算机 信息安全 RESEARCH PAPER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Analysis of bitcoin backbone protocol in the non-flat model
Ni, Peifang; Li, Hongda; Pan, Dongxue
Sci China Inf Sci, 2020, 63(3): 130105
Keywords: bitcoin system; proof-of-work; computational power; non-flat model; transaction ledger
Cite as: Ni P F, Li H D, Pan D X. Analysis of bitcoin backbone protocol in the non-flat model. Sci China Inf Sci, 2020, 63(3): 130105, doi: 10.1007/s11432-019-2698-1

计算机 信息安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Static tainting extraction approach based on information flow graph for personally identifiable information
Liu, Yi; Liao, Lejian; Song, Tian
Sci China Inf Sci, 2020, 63(3): 132104
Keywords: personally identifiable information; network privacy leak detection; static tainting; network traffic analysis; information flow graph; inter-domain routing; intra-domain infection; constraint function
Cite as: Liu Y, Liao L J, Song T. Static tainting extraction approach based on information flow graph for personally identifiable information. Sci China Inf Sci, 2020, 63(3): 132104, doi: 10.1007/s11432-018-9839-6

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

An improved PAAs countermeasure based on permutation tables and latch PUF
Li, Bing; Chen, Shuai; Wang, Kai
Sci China Inf Sci, 2020, 63(3): 139104
Keywords: paas; improved permutation tables masking scheme; latch puf; trng; fpga
Cite as: Li B, Chen S, Wang K. An improved PAAs countermeasure based on permutation tables and latch PUF. Sci China Inf Sci, 2020, 63(3): 139104, doi: 10.1007/s11432-018-9540-y

计算机 信息安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Characterizing differential support of vectorial Boolean functions using the Walsh transform
Peng, Jie; Gao, Jianhua; Kan, Haibin
Sci China Inf Sci, 2020, 63(3): 139108
Keywords: vectorial boolean function; nonlinearity; differential uniformity; differentially two-valued function; walsh transform
Cite as: Peng J, Gao J H, Kan H B. Characterizing differential support of vectorial Boolean functions using the Walsh transform. Sci China Inf Sci, 2020, 63(3): 139108, doi: 10.1007/s11432-018-9614-3

计算机 信息安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Improved distinguisher search techniques based on parity sets
Xie, Xiaofeng; Tian, Tian
Sci China Inf Sci, 2020, 63(3): 139111
Keywords: division property; parity set; meet-in-the-middle; integral attacks; present
Cite as: Xie X F, Tian T. Improved distinguisher search techniques based on parity sets. Sci China Inf Sci, 2020, 63(3): 139111, doi: 10.1007/s11432-018-9495-x

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Ciphertext-only fault analysis on the Midori lightweight cryptosystem
Li, Wei; Liao, Linfeng; Gu, Dawu; Cao, Shan; Wu, Yixin; Li, Jiayao; Zhou, Zhihong; Guo, Zheng; Liu, Ya; Liu, Zhiqiang
Sci China Inf Sci, 2020, 63(3): 139112
Keywords: lightweight cryptosystem; midori; fault analysis; ciphertext-only fault analysis; cryptanalysis
Cite as: Li W, Liao L F, Gu D W, et al. Ciphertext-only fault analysis on the Midori lightweight cryptosystem. Sci China Inf Sci, 2020, 63(3): 139112, doi: 10.1007/s11432-018-9522-6

计算机 信息安全 RESEARCH PAPER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Renyi divergence on learning with errors
Tao, Yang; Wang, Han; Zhang, Rui
Sci China Inf Sci, 2020, 63(9): 192101
Keywords: renyi divergence; learning with errors; decision problems; search problems; post-quantum cryptography
Cite as: Tao Y, Wang H, Zhang R. Renyi divergence on learning with errors. Sci China Inf Sci, 2020, 63(9): 192101, doi: 10.1007/s11432-018-9788-1

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

On the k-error linear complexity of 2p(2)-periodic binary sequences
Niu, Zhihua; Yuan, Can; Chen, Zhixiong; Du, Xiaoni; Zhang, Tao
Sci China Inf Sci, 2020, 63(9): 199101
Keywords: cryptography; stream cipher; binary sequences; generalized cyclotomic sequences; linear complexity; k-error linear complexity
Cite as: Niu Z H, Yuan C, Chen Z X, et al. On the k-error linear complexity of 2p(2)-periodic binary sequences. Sci China Inf Sci, 2020, 63(9): 199101, doi: 10.1007/s11432-019-2665-5

计算机 信息安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Certificateless designated verifier proxy signature scheme for unmanned aerial vehicle networks
He, Lei; Ma, Jianfeng; Shen, Limin; Wei, Dawei
Sci China Inf Sci, 2021, 64(1): 112101
Keywords: certificateless; designated verifier; proxy; digital signature; unmanned aerial vehicle
Cite as: He L, Ma J F, Shen L M, et al. Certificateless designated verifier proxy signature scheme for unmanned aerial vehicle networks. Sci China Inf Sci, 2021, 64(1): 112101, doi: 10.1007/s11432-019-2903-2

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Secure key-alternating Feistel ciphers without key schedule
Shen, Yaobin; Yan, Hailun; Wang, Lei; Lai, Xuejia
Sci China Inf Sci, 2021, 64(1): 119103
Keywords: blockciphers; key schedule; key-alternating feistel; provable security; h-coefficient technique
Cite as: Shen Y B, Yan H L, Wang L, et al. Secure key-alternating Feistel ciphers without key schedule. Sci China Inf Sci, 2021, 64(1): 119103, doi: 10.1007/s11432-019-9938-0

计算机 信息安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Secure fusion of encrypted remote sensing images based on Brovey
Yang, Junzhi; Cheng, Guohua; Shen, Meng
Sci China Inf Sci, 2021, 64(2): 129102
Keywords: remote sensing; image fusion; brovey; privacy preserving; cloud computing
Cite as: Yang J Z, Cheng G H, Shen M. Secure fusion of encrypted remote sensing images based on Brovey. Sci China Inf Sci, 2021, 64(2): 129102, doi: 10.1007/s11432-018-9572-x

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

New automatic tool for finding impossible differentials and zero-correlation linear approximations
Cui, Tingting; Chen, Shiyao; Fu, Kai; Wang, Meiqin; Jia, Keting
Sci China Inf Sci, 2021, 64(2): 129103
Keywords: impossible differential cryptanalysis; zero-correlation linear cryptanalysis; milp; automatic tool; block cipher
Cite as: Cui T T, Chen S Y, Fu K, et al. New automatic tool for finding impossible differentials and zero-correlation linear approximations. Sci China Inf Sci, 2021, 64(2): 129103, doi: 10.1007/s11432-018-1506-4

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Multi-user security of the tweakable Even-Mansour cipher
Zhang, Ping; Yuan, Qian; Hu, Honggang; Wang, Peng
Sci China Inf Sci, 2021, 64(3): 139102
Keywords: symmetric cryptography; tweakable blockcipher; tweakable even-mansour cipher; multi-user security; tightness; birthday bound; beyond birthday bound
Cite as: Zhang P, Yuan Q, Hu H G, et al. Multi-user security of the tweakable Even-Mansour cipher. Sci China Inf Sci, 2021, 64(3): 139102, doi: 10.1007/s11432-018-9757-4

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes
Qin, Lingyue; Dong, Xiaoyang; Jia, Keting; Zong, Rui
Sci China Inf Sci, 2021, 64(3): 139103
Keywords: frit; duplex authenticated encryption mode; key-dependent cube attack; key-recovery; permutation-based cryptology
Cite as: Qin L Y, Dong X Y, Jia K T, et al. Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes. Sci China Inf Sci, 2021, 64(3): 139103, doi: 10.1007/s11432-018-9798-8

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Error estimation of practical convolution discrete Gaussian sampling with rejection sampling
Zheng, Zhongxiang; Wang, Xiaoyun; Xu, Guangwu; Zhao, Chunhuan
Sci China Inf Sci, 2021, 64(3): 139104
Keywords: discrete gaussian sampling; convolution theorem; lattice; error estimation; gaussian measure
Cite as: Zheng Z X, Wang X Y, Xu G W, et al. Error estimation of practical convolution discrete Gaussian sampling with rejection sampling. Sci China Inf Sci, 2021, 64(3): 139104, doi: 10.1007/s11432-019-9919-7

计算机 信息安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Efficient outsourced extraction of histogram features over encrypted images in cloud
Ren, Yanli; Zhang, Xinpeng; Gu, Dawu; Feng, Guorui
Sci China Inf Sci, 2021, 64(3): 139105
Keywords: cloud computing; outsourced computation; histogram feature; image steganalysis; symmetric encryption
Cite as: Ren Y L, Zhang X P, Gu D W, et al. Efficient outsourced extraction of histogram features over encrypted images in cloud. Sci China Inf Sci, 2021, 64(3): 139105, doi: 10.1007/s11432-018-9901-0

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Do multiple infections lead to better security? A new study on CHES 2014 infective countermeasure
Feng, Jingyi; Chen, Hua; Cao, Weiqiong; Fan, Limin; Xi, Wei; Feng, Dengguo
Sci China Inf Sci, 2021, 64(5): 159101
Keywords: fault attack; infective countermeasure; multiple infections; double-fault attack; fa-sca combined attack; random fault
Cite as: Feng J Y, Chen H, Cao W Q, et al. Do multiple infections lead to better security? A new study on CHES 2014 infective countermeasure. Sci China Inf Sci, 2021, 64(5): 159101, doi: 10.1007/s11432-018-9797-9

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Unbalanced sharing: a threshold implementation of SM4
Wei, Man; Sun, Siwei; Wei, Zihao; Hu, Lei
Sci China Inf Sci, 2021, 64(5): 159102
Keywords: side channel analysis; masking; threshold implementation; sm4; dpa
Cite as: Wei M, Sun S W, Wei Z H, et al. Unbalanced sharing: a threshold implementation of SM4. Sci China Inf Sci, 2021, 64(5): 159102, doi: 10.1007/s11432-018-9794-6

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Hashing multiple messages with SM3 on GPU platforms
Sun, Shuzhou; Zhang, Rui; Ma, Hui
Sci China Inf Sci, 2021, 64(9): 199103
Keywords: sm3; hash algorithm; parallel computation; gpu; high performance implementation
Cite as: Sun S Z, Zhang R, Ma H. Hashing multiple messages with SM3 on GPU platforms. Sci China Inf Sci, 2021, 64(9): 199103, doi: 10.1007/s11432-018-9648-x

计算机 信息安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 0

On-demand cut off the covert channel to mitigate meltdown
Tan, Yusong; Chen, Baozi; Zhu, Liehuang; Wu, Qingbo; Zou, Peng; Li, Yuanzhang
Sci China Inf Sci, 2021, 64(9): 199104
Keywords: security vulnerability; meltdown attack; system performance; cache attack; microarchitecture attack; side channel
Cite as: Tan Y S, Chen B Z, Zhu L H, et al. On-demand cut off the covert channel to mitigate meltdown. Sci China Inf Sci, 2021, 64(9): 199104, doi: 10.1007/s11432-018-9678-8

计算机 信息安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Improved Guess and Determine attack on the MASHA stream cipher
Ding, Lin; Gu, Dawu; Wang, Lei; Jin, Chenhui; Guan, Jie
Sci China Inf Sci, 2021, 64(9): 199105
Keywords: cryptanalysis; stream cipher; guess and determine attack; masha; k2
Cite as: Ding L, Gu D W, Wang L, et al. Improved Guess and Determine attack on the MASHA stream cipher. Sci China Inf Sci, 2021, 64(9): 199105, doi: 10.1007/s11432-018-9878-1

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

A CCA secure public key encryption scheme based on finite groups of Lie type
Hong, Haibo; Shao, Jun; Wang, Licheng; Xie, Mande; Wei, Guiyi; Yang, Yixian; Han, Song; Lin, Jianhong
Sci China Inf Sci, 2022, 65(1): 119102
Keywords: finite groups of lie type; exponential mapping; public key encryption; non-abelian factoring assumption; non-abelian inserting assumption
Cite as: Hong H B, Shao J, Wang L C, et al. A CCA secure public key encryption scheme based on finite groups of Lie type. Sci China Inf Sci, 2022, 65(1): 119102, doi: 10.1007/s11432-019-2704-7

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Correlation leakage analysis based on masking schemes
Zhang, Jiawei; Niu, Yongchuan; Wang, An
Sci China Inf Sci, 2022, 65(2): 129101
Keywords: correlation leakage analysis; correlation leakage model; second-order analysis; side-channel attack; masking schemes
Cite as: Zhang J W, Niu Y C, Wang A. Correlation leakage analysis based on masking schemes. Sci China Inf Sci, 2022, 65(2): 129101, doi: 10.1007/s11432-019-2719-2

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Related-tweakey impossible differential attack on QARMA-128
Du, Juan; Wang, Wei; Li, Muzhou; Wang, Meiqin
Sci China Inf Sci, 2022, 65(2): 129102
Keywords: tweakable block cipher; qarma; impossible differential; related tweakey; milp
Cite as: Du J, Wang W, Li M Z, et al. Related-tweakey impossible differential attack on QARMA-128. Sci China Inf Sci, 2022, 65(2): 129102, doi: 10.1007/s11432-019-2628-9

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Ciphertext-only fault analysis of GIFT lightweight cryptosystem
Li, Wei; Cao, Shan; Gu, Dawu; Li, Jiayao; Cai, Tianpei; Wang, Menglin; Sun, Li; Liu, Zhiqiang; Liu, Ya
Sci China Inf Sci, 2022, 65(3): 139102
Keywords: lightweight cryptosystem; gift; ciphertext-only fault analysis; cryptanalysis; fault analysis
Cite as: Li W, Cao S, Gu D W, et al. Ciphertext-only fault analysis of GIFT lightweight cryptosystem. Sci China Inf Sci, 2022, 65(3): 139102, doi: 10.1007/s11432-019-2629-y

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Improved nonlinear invariant attack
Tong, Haipeng; Shen, Xuan; Li, Chao; Liu, Yunwen
Sci China Inf Sci, 2022, 65(3): 139103
Keywords: nonlinear invariant attack; 4-bit optimal s-boxes; q-equivalence; fides; distinguishing attack
Cite as: Tong H P, Shen X, Li C, et al. Improved nonlinear invariant attack. Sci China Inf Sci, 2022, 65(3): 139103, doi: 10.1007/s11432-019-2632-1

计算机 信息安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 0

On the bit-based division property of S-boxes
Xiang, Zejun; Zeng, Xiangyong; Zhang, Shasha
Sci China Inf Sci, 2022, 65(4): 149101
Keywords: division property; sbox; anf; divisional optimal; divisional suboptimal
Cite as: Xiang Z J, Zeng X Y, Zhang S S. On the bit-based division property of S-boxes. Sci China Inf Sci, 2022, 65(4): 149101, doi: 10.1007/s11432-019-2634-7

计算机 信息安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy
Guo, Xiaojie; Li, Jin; Liu, Zheli; Wei, Yu; Zhang, Xiao; Dong, Changyu
Sci China Inf Sci, 2022, 65(5): 152106
Keywords: data sharing; homomorphic encryption; blockchain; smart contract; game theory
Cite as: Guo X J, Li J, Liu Z L, et al. Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy. Sci China Inf Sci, 2022, 65(5): 152106, doi: 10.1007/s11432-020-2940-8

计算机 信息安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Pseudorandom number generator based on supersingular elliptic curve isogenies
Huang, Yan; Zhang, Fangguo; Liu, Zhijie; Tian, Haibo
Sci China Inf Sci, 2022, 65(5): 159101
Keywords: post-quantum cryptography; pseudorandom generator; supersingular elliptic curve isogenies; decisional supersingular product; indistinguishability
Cite as: Huang Y, Zhang F G, Liu Z J, et al. Pseudorandom number generator based on supersingular elliptic curve isogenies. Sci China Inf Sci, 2022, 65(5): 159101, doi: 10.1007/s11432-019-2669-6

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Generalizing Lyubashevsky-Wichs trapdoor sampler for NTRU lattices
Tao, Yang; Ji, Yunfeng; Zhang, Rui
Sci China Inf Sci, 2022, 65(5): 159103
Keywords: trapdoor sampler; ntru lattice; hash-and-sign; lattice-based signature; post-quantum cryptography
Cite as: Tao Y, Ji Y F, Zhang R. Generalizing Lyubashevsky-Wichs trapdoor sampler for NTRU lattices. Sci China Inf Sci, 2022, 65(5): 159103, doi: 10.1007/s11432-019-2699-6

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

A small first-order DPA resistant AES implementation with no fresh randomness
Wei, Man; Sun, Siwei; Wei, Zihao; Gong, Zheng; Hu, Lei
Sci China Inf Sci, 2022, 65(6): 169102
Keywords: side channel analysis; dpa; threshold implementation; domain-oriented masking; aes
Cite as: Wei M, Sun S W, Wei Z H, et al. A small first-order DPA resistant AES implementation with no fresh randomness. Sci China Inf Sci, 2022, 65(6): 169102, doi: 10.1007/s11432-019-1469-7

计算机 信息安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

SAND: semi-automated adaptive network defense via programmable rule generation and deployment
Chen, Haoyu; Zou, Deqing; Jin, Hai; Xu, Shouhuai; Yuan, Bin
Sci China Inf Sci, 2022, 65(7): 172102
Keywords: network defense; adaptive defense; automated defense; programmable defense; security services; software-defined networking; security management
Cite as: Chen H Y, Zou D Q, Jin H, et al. SAND: semi-automated adaptive network defense via programmable rule generation and deployment. Sci China Inf Sci, 2022, 65(7): 172102, doi: 10.1007/s11432-020-3193-2

计算机 信息安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 0

An empirical study of security issues in SSO server-side implementations
Wang, Hui; Gu, Dawu; Zhang, Yuanyuan; Hu, Yikun
Sci China Inf Sci, 2022, 65(7): 179104
Keywords: single sign-on; oauth; openid connect; federated identity management; access control
Cite as: Wang H, Gu D W, Zhang Y Y, et al. An empirical study of security issues in SSO server-side implementations. Sci China Inf Sci, 2022, 65(7): 179104, doi: 10.1007/s11432-019-2697-1

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Malware incident response (IR) informed by cyber threat intelligence (CTI)
He, Ying; Inglut, Ellis; Luo, Cunjin
Sci China Inf Sci, 2022, 65(7): 179105
Keywords: malware analysis; cyber threat intelligence; crypto jacking; incident response; malware incident response
Cite as: He Y, Inglut E, Luo C J. Malware incident response (IR) informed by cyber threat intelligence (CTI). Sci China Inf Sci, 2022, 65(7): 179105, doi: 10.1007/s11432-019-2774-4

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Efficient middlebox scaling for virtualized intrusion prevention systems in software-defined networks
Xing, Junchi; Wu, Chunming; Zhou, Haifeng; Cheng, Qiumei; Yu, Danrui; Macas, Mayra
Sci China Inf Sci, 2022, 65(8): 189102
Keywords: intrusion prevention system; middlebox scaling; software-defined network; security; resource utilization
Cite as: Xing J C, Wu C M, Zhou H F, et al. Efficient middlebox scaling for virtualized intrusion prevention systems in software-defined networks. Sci China Inf Sci, 2022, 65(8): 189102, doi: 10.1007/s11432-019-2731-7

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Hierarchical group signature with verifier-local revocation revisited
Hou, Lin; Lin, Dongdai; Liu, Renzhang
Sci China Inf Sci, 2022, 65(8): 189103
Keywords: group signature; hierarchical group signature; verifier-local revocation; generic construction; lattice-based cryptography
Cite as: Hou L, Lin D D, Liu R Z. Hierarchical group signature with verifier-local revocation revisited. Sci China Inf Sci, 2022, 65(8): 189103, doi: 10.1007/s11432-019-2709-7

计算机 信息安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

A benchmark for visual analysis of insider threat detection
Zhao, Ying; Yang, Kui; Chen, Siming; Zhang, Zhuo; Huang, Xin; Li, Qiusheng; Ma, Qi; Luan, Xinyue; Fan, Xiaoping
Sci China Inf Sci, 2022, 65(9): 199102
Keywords: visual analytics; visualization; evaluation; benchmark; intellligence analysis
Cite as: Zhao Y, Yang K, Chen S M, et al. A benchmark for visual analysis of insider threat detection. Sci China Inf Sci, 2022, 65(9): 199102, doi: 10.1007/s11432-019-2776-4