Australasian Conference on Information Security and Privacy最新文献

筛选
英文 中文
SoK: Decentralized Randomness Beacon Protocols SoK:分散随机信标协议
Australasian Conference on Information Security and Privacy Pub Date : 2022-05-26 DOI: 10.48550/arXiv.2205.13333
Mayank Raikwar, D. Gligoroski
{"title":"SoK: Decentralized Randomness Beacon Protocols","authors":"Mayank Raikwar, D. Gligoroski","doi":"10.48550/arXiv.2205.13333","DOIUrl":"https://doi.org/10.48550/arXiv.2205.13333","url":null,"abstract":". The scientific interest in the area of Decentralized Randomness Beacon (DRB) protocols has been thriving recently. Partially that interest is due to the success of the disruptive technologies introduced by modern cryptography, such as cryptocurrencies, blockchain technologies, and decentralized finances, where there is an enormous need for a public, reliable, trusted, verifiable, and distributed source of randomness. On the other hand, recent advancements in the development of new cryptographic primitives brought a huge interest in constructing a plethora of DRB protocols differing in design and underlying primitives. To the best of our knowledge, no systematic and comprehensive work systematizes and analyzes the existing DRB protocols. Therefore, we present a Systematization of Knowledge (SoK) intending to structure the multi-faced body of research on DRB protocols. In this SoK, we delineate the DRB protocols along the following axes: their underlying primitive, properties, and security. This SoK tries to fill that gap by providing basic standard definitions and requirements for DRB protocols, such as Unpredictability, Bias-resistance, Availability (or Liveness), and Public Verifiability. We classify DRB protocols according to the nature of interactivity among protocol participants. We also highlight the most significant features of DRB protocols such as scalability, complexity, and performance along with a brief discussion on its improvement. We present future research directions along with a few interesting research problems.","PeriodicalId":109456,"journal":{"name":"Australasian Conference on Information Security and Privacy","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117327800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Oriole: Thwarting Privacy against Trustworthy Deep Learning Models 金莺:阻止隐私对抗可信赖的深度学习模型
Australasian Conference on Information Security and Privacy Pub Date : 2021-02-23 DOI: 10.1007/978-3-030-90567-5_28
Liuqiao Chen, Hu Wang, Benjamin Zi Hao Zhao, Minhui Xue, Hai-feng Qian
{"title":"Oriole: Thwarting Privacy against Trustworthy Deep Learning Models","authors":"Liuqiao Chen, Hu Wang, Benjamin Zi Hao Zhao, Minhui Xue, Hai-feng Qian","doi":"10.1007/978-3-030-90567-5_28","DOIUrl":"https://doi.org/10.1007/978-3-030-90567-5_28","url":null,"abstract":"","PeriodicalId":109456,"journal":{"name":"Australasian Conference on Information Security and Privacy","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128148628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks 基于共识信任的物联网网络多重混合攻击恶意节点检测
Australasian Conference on Information Security and Privacy Pub Date : 2020-11-30 DOI: 10.1007/978-3-030-55304-3_13
Zuchao Ma, Liang Liu, W. Meng
{"title":"DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks","authors":"Zuchao Ma, Liang Liu, W. Meng","doi":"10.1007/978-3-030-55304-3_13","DOIUrl":"https://doi.org/10.1007/978-3-030-55304-3_13","url":null,"abstract":"","PeriodicalId":109456,"journal":{"name":"Australasian Conference on Information Security and Privacy","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125112913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
PALOR: Poisoning Attacks Against Logistic Regression PALOR:对逻辑回归的中毒攻击
Australasian Conference on Information Security and Privacy Pub Date : 2020-11-30 DOI: 10.1007/978-3-030-55304-3_23
Jialin Wen, Benjamin Zi Hao Zhao, Minhui Xue, Hai-feng Qian
{"title":"PALOR: Poisoning Attacks Against Logistic Regression","authors":"Jialin Wen, Benjamin Zi Hao Zhao, Minhui Xue, Hai-feng Qian","doi":"10.1007/978-3-030-55304-3_23","DOIUrl":"https://doi.org/10.1007/978-3-030-55304-3_23","url":null,"abstract":"","PeriodicalId":109456,"journal":{"name":"Australasian Conference on Information Security and Privacy","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122420935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Rolling Attack: An Efficient Way to Reduce Armors of Office Automation Devices 滚动攻击:降低办公自动化设备防护的有效方法
Australasian Conference on Information Security and Privacy Pub Date : 2020-11-30 DOI: 10.1007/978-3-030-55304-3_25
Linyu Li, Lei-Ping Yu, Can Yang, Jie Gou, J. Yin, Xiaorui Gong
{"title":"Rolling Attack: An Efficient Way to Reduce Armors of Office Automation Devices","authors":"Linyu Li, Lei-Ping Yu, Can Yang, Jie Gou, J. Yin, Xiaorui Gong","doi":"10.1007/978-3-030-55304-3_25","DOIUrl":"https://doi.org/10.1007/978-3-030-55304-3_25","url":null,"abstract":"","PeriodicalId":109456,"journal":{"name":"Australasian Conference on Information Security and Privacy","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129150552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method 用滑动窗口法从噪声平方乘序列中恢复CRT-RSA密钥
Australasian Conference on Information Security and Privacy Pub Date : 2020-11-30 DOI: 10.1007/978-3-030-55304-3_34
Kento Oonishi, N. Kunihiro
{"title":"Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method","authors":"Kento Oonishi, N. Kunihiro","doi":"10.1007/978-3-030-55304-3_34","DOIUrl":"https://doi.org/10.1007/978-3-030-55304-3_34","url":null,"abstract":"","PeriodicalId":109456,"journal":{"name":"Australasian Conference on Information Security and Privacy","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116426029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Arbitrary-Centered Discrete Gaussian Sampling over the Integers 整数上的任意中心离散高斯抽样
Australasian Conference on Information Security and Privacy Pub Date : 2020-11-30 DOI: 10.1007/978-3-030-55304-3_20
Yusong Du, Baoying Fan, Baodian Wei
{"title":"Arbitrary-Centered Discrete Gaussian Sampling over the Integers","authors":"Yusong Du, Baoying Fan, Baodian Wei","doi":"10.1007/978-3-030-55304-3_20","DOIUrl":"https://doi.org/10.1007/978-3-030-55304-3_20","url":null,"abstract":"","PeriodicalId":109456,"journal":{"name":"Australasian Conference on Information Security and Privacy","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133896543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-input Laconic Function Evaluation 多输入简洁功能评估
Australasian Conference on Information Security and Privacy Pub Date : 2020-11-30 DOI: 10.1007/978-3-030-55304-3_19
Bo Pang, Long Chen, Xiong Fan, Qiang Tang
{"title":"Multi-input Laconic Function Evaluation","authors":"Bo Pang, Long Chen, Xiong Fan, Qiang Tang","doi":"10.1007/978-3-030-55304-3_19","DOIUrl":"https://doi.org/10.1007/978-3-030-55304-3_19","url":null,"abstract":"","PeriodicalId":109456,"journal":{"name":"Australasian Conference on Information Security and Privacy","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131892489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Duplication Based Countermeasure to Statistical Ineffective Fault Analysis 基于复制的统计无效故障分析对策
Australasian Conference on Information Security and Privacy Pub Date : 2020-11-30 DOI: 10.1007/978-3-030-55304-3_27
Anubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, S. Bhasin, Dhiman Saha, A. Chattopadhyay
{"title":"A Novel Duplication Based Countermeasure to Statistical Ineffective Fault Analysis","authors":"Anubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, S. Bhasin, Dhiman Saha, A. Chattopadhyay","doi":"10.1007/978-3-030-55304-3_27","DOIUrl":"https://doi.org/10.1007/978-3-030-55304-3_27","url":null,"abstract":"","PeriodicalId":109456,"journal":{"name":"Australasian Conference on Information Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130573263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition 高阶奇异值分解的安全外包
Australasian Conference on Information Security and Privacy Pub Date : 2020-11-30 DOI: 10.1007/978-3-030-55304-3_16
Jinrong Chen, Lin Liu, Rongmao Chen, Wei Peng
{"title":"SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition","authors":"Jinrong Chen, Lin Liu, Rongmao Chen, Wei Peng","doi":"10.1007/978-3-030-55304-3_16","DOIUrl":"https://doi.org/10.1007/978-3-030-55304-3_16","url":null,"abstract":"","PeriodicalId":109456,"journal":{"name":"Australasian Conference on Information Security and Privacy","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122253298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信