1,601 research outputs found
An attack against message authentication in the ERTMS train to trackside communication protocols
Contains fulltext :
173193.pdf (publisher's version ) (Closed access)ASIA CCS '17: 2017 ACM on Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates — April 02 - 06, 201
RACED: Routing in Payment Channel Networks Using Distributed Hash Tables
The Bitcoin scalability problem has led to the development of off-chain
financial mechanisms such as payment channel networks (PCNs) which help users
process transactions of varying amounts, including micro-payment transactions,
without writing each transaction to the blockchain. Since PCNs only allow
path-based transactions, effective, secure routing protocols that find a path
between a sender and receiver are fundamental to PCN operations. In this paper,
we propose RACED, a routing protocol that leverages the idea of Distributed
Hash Tables (DHTs) to route transactions in PCNs in a fast and secure way. Our
experiments on real-world transaction datasets show that RACED gives an average
transaction success ratio of 98.74%, an average pathfinding time of 31.242
seconds, which is , , and times faster than three
other recent routing protocols that offer comparable security/privacy
properties. We rigorously analyze and prove the security of RACED in the
Universal Composability framework.Comment: A short version of this work has been accepted to the 19th ACM ASIA
Conference on Computer and Communications Security (ACM ASIACCS 2024
Utilizing Public Blockchains for the Sybil-Resistant Bootstrapping of Distributed Anonymity Services
Distributed anonymity services, such as onion routing networks or
cryptocurrency tumblers, promise privacy protection without trusted third
parties. While the security of these services is often well-researched,
security implications of their required bootstrapping processes are usually
neglected: Users either jointly conduct the anonymization themselves, or they
need to rely on a set of non-colluding privacy peers. However, the typically
small number of privacy peers enable single adversaries to mimic distributed
services. We thus present AnonBoot, a Sybil-resistant medium to securely
bootstrap distributed anonymity services via public blockchains. AnonBoot
enforces that peers periodically create a small proof of work to refresh their
eligibility for providing secure anonymity services. A pseudo-random, locally
replicable bootstrapping process using on-chain entropy then prevents biasing
the election of eligible peers. Our evaluation using Bitcoin as AnonBoot's
underlying blockchain shows its feasibility to maintain a trustworthy
repository of 1000 peers with only a small storage footprint while supporting
arbitrarily large user bases on top of most blockchains.Comment: To be published in the proceedings of the 15th ACM ASIA Conference on
Computer and Communications Security (ACM ASIACCS'20
Efficient Privacy-Preserving Approximation of the Kidney Exchange Problem
The kidney exchange problem (KEP) seeks to find possible exchanges among
pairs of patients and their incompatible kidney donors while meeting specific
optimization criteria such as maximizing the overall number of possible
transplants. Recently, several privacy-preserving protocols for solving the KEP
have been proposed. However, the protocols known to date lack scalability in
practice since the KEP is an NP-complete problem. We address this issue by
proposing a novel privacy-preserving protocol which computes an approximate
solution for the KEP that scales well for the large numbers of patient-donor
pairs encountered in practice. As opposed to prior work on privacy-preserving
kidney exchange, our protocol is generic w.r.t.\ the security model that can be
employed. Compared to the most efficient privacy-preserving protocols for
kidney exchange existing to date, our protocol is entirely data oblivious and
it exhibits a far superior run time performance. As a second contribution, we
use a real-world data set to simulate the application of our protocol as part
of a kidney exchange platform, where patient-donor pairs register and
de-register over time, and thereby determine its approximation quality in a
real-world setting.Comment: Accepted at ACM Asia Conference on Computer and Communications
Security (ASIA CCS 2024
Secure Similar Sequence Query on Outsourced Genomic Data
The growing availability of genomic data is unlocking research potentials on genomic-data analysis. It is of great importance to outsource the genomic-analysis tasks onto clouds to leverage their powerful computational resources over the large-scale genomic sequences. However, the remote placement of the data raises personal-privacy concerns, and it is challenging to evaluate data-analysis functions on outsourced genomic data securely and efficiently. In this work, we study the secure similar-sequence-query (SSQ) problem over outsourced genomic data, which has not been fully investigated. To address the challenges of security and efficiency, we propose two protocols in the mixed form, which combine two-party secure secret sharing, garbled circuit, and partial homomorphic encryptions together and use them to jointly fulfill the secure SSQ function. In addition, our protocols support multi-user queries over a joint genomic data set collected from multiple data owners, making our solution scalable. We formally prove the security of protocols under the semi-honest adversary model, and theoretically analyze the performance. We use extensive experiments over real-world dataset on a commercial cloud platform to validate the efficacy of our proposed solution, and demonstrate the performance improvements compared with state-of-the-art works
- …