Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Muslum Ozgur Ozmen is active.

Publication


Featured researches published by Muslum Ozgur Ozmen.


computer and communications security | 2018

TACHYON: Fast Signatures from Compact Knapsack

Rouzbeh Behnia; Muslum Ozgur Ozmen; Attila A. Yavuz; Mike Rosulek

We introduce a simple, yet efficient digital signature scheme which offers post-quantum security promise. Our scheme, named TACHYON, is based on a novel approach for extending one-time hash-based signatures to (polynomially bounded) many-time signatures, using the additively homomorphic properties of generalized compact knapsack functions. Our design permits TACHYON~to achieve several key properties. First, its signing and verification algorithms are the fastest among its current counterparts with a higher level of security. This allows TACHYON~to achieve the lowest end-to-end delay among its counterparts, while also making it suitable for resource-limited signers. Second, its private keys can be as small as κ bits, where κ is the desired security level. Third, unlike most of its lattice-based counterparts, TACHYON~does not require any Gaussian sampling during signing, and therefore, is free from side-channel attacks targeting this process. We also explore various speed and storage trade-offs for TACHYON, thanks to its highly tunable parameters. Some of these trade-offs can speed up TACHYON signing in exchange for larger keys, thereby permitting TACHYON~to further improve its end-to-end delay.


the internet of things | 2017

Low-Cost Standard Public Key Cryptography Services for Wireless IoT Systems

Muslum Ozgur Ozmen; Attila A. Yavuz

Internet of Things (IoT) is an integral part of application domains such as smart-home and digital healthcare. Various standard public key cryptography techniques (e.g., key exchange, public key encryption, signature) are available to provide fundamental security services for IoTs. However, despite their pervasiveness and well-proven security, they also have been shown to be highly energy costly for embedded devices. Hence, it is a critical task to improve the energy efficiency of standard cryptographic services, while preserving their desirable properties simultaneously. In this paper, we exploit synergies among various cryptographic primitives with algorithmic optimizations to substantially reduce the energy consumption of standard cryptographic techniques on embedded devices. Our contributions are: (i) We harness special precomputation techniques, which have not been considered for some important cryptographic standards to boost the performance of key exchange, integrated encryption, and hybrid constructions. (ii) We provide self-certification for these techniques to push their performance to the edge. (iii) We implemented our techniques and their counterparts on 8-bit AVR ATmega 2560 and evaluated their performance. We used microECC library and made the implementations on NIST-recommended secp192 curve, due to its standardization. Our experiments confirmed significant improvements on the battery life (up to 7x) while preserving the desirable properties of standard techniques. Moreover, to the best of our knowledge, we provide the first open-source framework including such set of optimizations on low-end devices.


IFIP Annual Conference on Data and Applications Security and Privacy | 2017

High-Speed High-Security Public Key Encryption with Keyword Search

Rouzbeh Behnia; Attila A. Yavuz; Muslum Ozgur Ozmen

Data privacy is one of the main concerns for clients who rely on cloud storage services. Standard encryption techniques can offer confidentiality; however, they prevent search capabilities over the encrypted data, thereby significantly degrading the utilization of cloud storage services. Public key Encryption with Keyword Search (PEKS) schemes offer encrypted search functionality to mitigate the impacts of privacy versus data utilization dilemma. PEKS schemes allow any client to encrypt their data under a public key such that the cloud, using the corresponding trapdoor, can later test whether the encrypted records contain certain keywords. Despite this great functionality, the existing PEKS schemes rely on extremely costly operations at the server-side, which often introduce unacceptable cryptographic delays in practical applications. Moreover, while data outsourcing applications usually demand long-term security, existing PEKS schemes do not offer post-quantum security.


IACR Cryptology ePrint Archive | 2018

Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset.

Thang Hoang; Muslum Ozgur Ozmen; Yeongjin Jang; Attila A. Yavuz


international conference on communications | 2018

Forward-Private Dynamic Searchable Symmetric Encryption with Efficient Search

Muslum Ozgur Ozmen; Thang Hoang; Attila A. Yavuz


communications and networking symposium | 2018

Compact Energy and Delay-Aware Authentication

Muslum Ozgur Ozmen; Rouzbeh Behnia; Attila A. Yavuz


IEEE Transactions on Dependable and Secure Computing | 2018

Lattice-Based Public Key Searchable Encryption from Experimental Perspectives

Rouzbeh Behnia; Muslum Ozgur Ozmen; Attila A. Yavuz


IACR Cryptology ePrint Archive | 2018

Compact Energy and Delay-aware Authentication.

Muslum Ozgur Ozmen; Rouzbeh Behnia; Attila A. Yavuz


IACR Cryptology ePrint Archive | 2017

Lattice-Based Public Key Encryption with Keyword Search.

Rouzbeh Behnia; Muslum Ozgur Ozmen; Attila A. Yavuz


IACR Cryptology ePrint Archive | 2017

Forward-Private Dynamic Searchable Symmetric Encryption with Efficient Search.

Muslum Ozgur Ozmen; Thang Hoang; Attila A. Yavuz

Collaboration


Dive into the Muslum Ozgur Ozmen's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Thang Hoang

Oregon State University

View shared research outputs
Top Co-Authors

Avatar

Mike Rosulek

Oregon State University

View shared research outputs
Top Co-Authors

Avatar

Yeongjin Jang

Georgia Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge