{"title":"SoK: Decentralized Randomness Beacon Protocols","authors":"Mayank Raikwar, D. Gligoroski","doi":"10.48550/arXiv.2205.13333","DOIUrl":"https://doi.org/10.48550/arXiv.2205.13333","url":null,"abstract":". The scientific interest in the area of Decentralized Randomness Beacon (DRB) protocols has been thriving recently. Partially that interest is due to the success of the disruptive technologies introduced by modern cryptography, such as cryptocurrencies, blockchain technologies, and decentralized finances, where there is an enormous need for a public, reliable, trusted, verifiable, and distributed source of randomness. On the other hand, recent advancements in the development of new cryptographic primitives brought a huge interest in constructing a plethora of DRB protocols differing in design and underlying primitives. To the best of our knowledge, no systematic and comprehensive work systematizes and analyzes the existing DRB protocols. Therefore, we present a Systematization of Knowledge (SoK) intending to structure the multi-faced body of research on DRB protocols. In this SoK, we delineate the DRB protocols along the following axes: their underlying primitive, properties, and security. This SoK tries to fill that gap by providing basic standard definitions and requirements for DRB protocols, such as Unpredictability, Bias-resistance, Availability (or Liveness), and Public Verifiability. We classify DRB protocols according to the nature of interactivity among protocol participants. We also highlight the most significant features of DRB protocols such as scalability, complexity, and performance along with a brief discussion on its improvement. We present future research directions along with a few interesting research problems.","PeriodicalId":109456,"journal":{"name":"Australasian Conference on Information Security and Privacy","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117327800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liuqiao Chen, Hu Wang, Benjamin Zi Hao Zhao, Minhui Xue, Hai-feng Qian
{"title":"Oriole: Thwarting Privacy against Trustworthy Deep Learning Models","authors":"Liuqiao Chen, Hu Wang, Benjamin Zi Hao Zhao, Minhui Xue, Hai-feng Qian","doi":"10.1007/978-3-030-90567-5_28","DOIUrl":"https://doi.org/10.1007/978-3-030-90567-5_28","url":null,"abstract":"","PeriodicalId":109456,"journal":{"name":"Australasian Conference on Information Security and Privacy","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128148628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks","authors":"Zuchao Ma, Liang Liu, W. Meng","doi":"10.1007/978-3-030-55304-3_13","DOIUrl":"https://doi.org/10.1007/978-3-030-55304-3_13","url":null,"abstract":"","PeriodicalId":109456,"journal":{"name":"Australasian Conference on Information Security and Privacy","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125112913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jialin Wen, Benjamin Zi Hao Zhao, Minhui Xue, Hai-feng Qian
{"title":"PALOR: Poisoning Attacks Against Logistic Regression","authors":"Jialin Wen, Benjamin Zi Hao Zhao, Minhui Xue, Hai-feng Qian","doi":"10.1007/978-3-030-55304-3_23","DOIUrl":"https://doi.org/10.1007/978-3-030-55304-3_23","url":null,"abstract":"","PeriodicalId":109456,"journal":{"name":"Australasian Conference on Information Security and Privacy","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122420935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Linyu Li, Lei-Ping Yu, Can Yang, Jie Gou, J. Yin, Xiaorui Gong
{"title":"Rolling Attack: An Efficient Way to Reduce Armors of Office Automation Devices","authors":"Linyu Li, Lei-Ping Yu, Can Yang, Jie Gou, J. Yin, Xiaorui Gong","doi":"10.1007/978-3-030-55304-3_25","DOIUrl":"https://doi.org/10.1007/978-3-030-55304-3_25","url":null,"abstract":"","PeriodicalId":109456,"journal":{"name":"Australasian Conference on Information Security and Privacy","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129150552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method","authors":"Kento Oonishi, N. Kunihiro","doi":"10.1007/978-3-030-55304-3_34","DOIUrl":"https://doi.org/10.1007/978-3-030-55304-3_34","url":null,"abstract":"","PeriodicalId":109456,"journal":{"name":"Australasian Conference on Information Security and Privacy","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116426029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Arbitrary-Centered Discrete Gaussian Sampling over the Integers","authors":"Yusong Du, Baoying Fan, Baodian Wei","doi":"10.1007/978-3-030-55304-3_20","DOIUrl":"https://doi.org/10.1007/978-3-030-55304-3_20","url":null,"abstract":"","PeriodicalId":109456,"journal":{"name":"Australasian Conference on Information Security and Privacy","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133896543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-input Laconic Function Evaluation","authors":"Bo Pang, Long Chen, Xiong Fan, Qiang Tang","doi":"10.1007/978-3-030-55304-3_19","DOIUrl":"https://doi.org/10.1007/978-3-030-55304-3_19","url":null,"abstract":"","PeriodicalId":109456,"journal":{"name":"Australasian Conference on Information Security and Privacy","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131892489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, S. Bhasin, Dhiman Saha, A. Chattopadhyay
{"title":"A Novel Duplication Based Countermeasure to Statistical Ineffective Fault Analysis","authors":"Anubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, S. Bhasin, Dhiman Saha, A. Chattopadhyay","doi":"10.1007/978-3-030-55304-3_27","DOIUrl":"https://doi.org/10.1007/978-3-030-55304-3_27","url":null,"abstract":"","PeriodicalId":109456,"journal":{"name":"Australasian Conference on Information Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130573263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition","authors":"Jinrong Chen, Lin Liu, Rongmao Chen, Wei Peng","doi":"10.1007/978-3-030-55304-3_16","DOIUrl":"https://doi.org/10.1007/978-3-030-55304-3_16","url":null,"abstract":"","PeriodicalId":109456,"journal":{"name":"Australasian Conference on Information Security and Privacy","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122253298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}