Muslum Ozgur Ozmen
Oregon State University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Muslum Ozgur Ozmen.
computer and communications security | 2018
Rouzbeh Behnia; Muslum Ozgur Ozmen; Attila A. Yavuz; Mike Rosulek
We introduce a simple, yet efficient digital signature scheme which offers post-quantum security promise. Our scheme, named TACHYON, is based on a novel approach for extending one-time hash-based signatures to (polynomially bounded) many-time signatures, using the additively homomorphic properties of generalized compact knapsack functions. Our design permits TACHYON~to achieve several key properties. First, its signing and verification algorithms are the fastest among its current counterparts with a higher level of security. This allows TACHYON~to achieve the lowest end-to-end delay among its counterparts, while also making it suitable for resource-limited signers. Second, its private keys can be as small as κ bits, where κ is the desired security level. Third, unlike most of its lattice-based counterparts, TACHYON~does not require any Gaussian sampling during signing, and therefore, is free from side-channel attacks targeting this process. We also explore various speed and storage trade-offs for TACHYON, thanks to its highly tunable parameters. Some of these trade-offs can speed up TACHYON signing in exchange for larger keys, thereby permitting TACHYON~to further improve its end-to-end delay.
the internet of things | 2017
Muslum Ozgur Ozmen; Attila A. Yavuz
Internet of Things (IoT) is an integral part of application domains such as smart-home and digital healthcare. Various standard public key cryptography techniques (e.g., key exchange, public key encryption, signature) are available to provide fundamental security services for IoTs. However, despite their pervasiveness and well-proven security, they also have been shown to be highly energy costly for embedded devices. Hence, it is a critical task to improve the energy efficiency of standard cryptographic services, while preserving their desirable properties simultaneously. In this paper, we exploit synergies among various cryptographic primitives with algorithmic optimizations to substantially reduce the energy consumption of standard cryptographic techniques on embedded devices. Our contributions are: (i) We harness special precomputation techniques, which have not been considered for some important cryptographic standards to boost the performance of key exchange, integrated encryption, and hybrid constructions. (ii) We provide self-certification for these techniques to push their performance to the edge. (iii) We implemented our techniques and their counterparts on 8-bit AVR ATmega 2560 and evaluated their performance. We used microECC library and made the implementations on NIST-recommended secp192 curve, due to its standardization. Our experiments confirmed significant improvements on the battery life (up to 7x) while preserving the desirable properties of standard techniques. Moreover, to the best of our knowledge, we provide the first open-source framework including such set of optimizations on low-end devices.
IFIP Annual Conference on Data and Applications Security and Privacy | 2017
Rouzbeh Behnia; Attila A. Yavuz; Muslum Ozgur Ozmen
Data privacy is one of the main concerns for clients who rely on cloud storage services. Standard encryption techniques can offer confidentiality; however, they prevent search capabilities over the encrypted data, thereby significantly degrading the utilization of cloud storage services. Public key Encryption with Keyword Search (PEKS) schemes offer encrypted search functionality to mitigate the impacts of privacy versus data utilization dilemma. PEKS schemes allow any client to encrypt their data under a public key such that the cloud, using the corresponding trapdoor, can later test whether the encrypted records contain certain keywords. Despite this great functionality, the existing PEKS schemes rely on extremely costly operations at the server-side, which often introduce unacceptable cryptographic delays in practical applications. Moreover, while data outsourcing applications usually demand long-term security, existing PEKS schemes do not offer post-quantum security.
IACR Cryptology ePrint Archive | 2018
Thang Hoang; Muslum Ozgur Ozmen; Yeongjin Jang; Attila A. Yavuz
international conference on communications | 2018
Muslum Ozgur Ozmen; Thang Hoang; Attila A. Yavuz
communications and networking symposium | 2018
Muslum Ozgur Ozmen; Rouzbeh Behnia; Attila A. Yavuz
IEEE Transactions on Dependable and Secure Computing | 2018
Rouzbeh Behnia; Muslum Ozgur Ozmen; Attila A. Yavuz
IACR Cryptology ePrint Archive | 2018
Muslum Ozgur Ozmen; Rouzbeh Behnia; Attila A. Yavuz
IACR Cryptology ePrint Archive | 2017
Rouzbeh Behnia; Muslum Ozgur Ozmen; Attila A. Yavuz
IACR Cryptology ePrint Archive | 2017
Muslum Ozgur Ozmen; Thang Hoang; Attila A. Yavuz