Rongmao Chen
National University of Defense Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Rongmao Chen.
IEEE Transactions on Information Forensics and Security | 2016
Rongmao Chen; Yi Mu; Guomin Yang; Fuchun Guo; Xiaofen Wang
Searchable encryption is of increasing interest for protecting the data privacy in secure searchable cloud storage. In this paper, we investigate the security of a well-known cryptographic primitive, namely, public key encryption with keyword search (PEKS) which is very useful in many applications of cloud storage. Unfortunately, it has been shown that the traditional PEKS framework suffers from an inherent insecurity called inside keyword guessing attack (KGA) launched by the malicious server. To address this security vulnerability, we propose a new PEKS framework named dual-server PEKS (DS-PEKS). As another main contribution, we define a new variant of the smooth projective hash functions (SPHFs) referred to as linear and homomorphic SPHF (LH-SPHF). We then show a generic construction of secure DS-PEKS from LH-SPHF. To illustrate the feasibility of our new framework, we provide an efficient instantiation of the general framework from a Decision Diffie-Hellman-based LH-SPHF and show that it can achieve the strong security against inside the KGA.
IEEE Transactions on Information Forensics and Security | 2015
Rongmao Chen; Yi Mu; Guomin Yang; Fuchun Guo
Deduplication is a popular technique widely used to save storage spaces in the cloud. To achieve secure deduplication of encrypted files, Bellare et al. formalized a new cryptographic primitive named message-locked encryption (MLE) in Eurocrypt 2013. Although an MLE scheme can be extended to obtain secure deduplication for large files, it requires a lot of metadata maintained by the end user and the cloud server. In this paper, we propose a new approach to achieve more efficient deduplication for (encrypted) large files. Our approach, named block-level message-locked encryption (BL-MLE), can achieve file-level and block-level deduplication, block key management, and proof of ownership simultaneously using a small set of metadata. We also show that our BL-MLE scheme can be easily extended to support proof of storage, which makes it multi-purpose for secure cloud storage.
australasian conference on information security and privacy | 2015
Rongmao Chen; Yi Mu; Guomin Yang; Fuchun Guo; Xiaofen Wang
Public Key Encryption with Keyword Search (PEKS), introduced by Boneh et al. in Eurocrypt’04, allows users to search encrypted documents on an untrusted server without revealing any information. This notion is very useful in many applications and has attracted a lot of attention by the cryptographic research community. However, one limitation of all the existing PEKS schemes is that they cannot resist the Keyword Guessing Attack (KGA) launched by a malicious server. In this paper, we propose a new PEKS framework named Dual-Server Public Key Encryption with Keyword Search (DS-PEKS). This new framework can withstand all the attacks, including the KGA from the two untrusted servers, as long as they do not collude. We then present a generic construction of DS-PEKS using a new variant of the Smooth Projective Hash Functions (SPHFs), which is of independent interest.
the cryptographers track at the rsa conference | 2016
Rongmao Chen; Yi Mu; Guomin Yang; Willy Susilo; Fuchun Guo
Authenticated Key Exchange AKE protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the following contributions. First, we revisit the security modelling of leakage-resilient AKE protocols, and show that the existing models either impose some unnatural restrictions or do not sufficiently capture leakage attacks in reality. We then introduce a new strong yet meaningful security model, named challenge-dependent leakage-resilient eCK
IEEE Transactions on Information Forensics and Security | 2016
Rongmao Chen; Yi Mu; Guomin Yang; Fuchun Guo; Xinyi Huang; Xiaofen Wang; Yongjun Wang
Designs, Codes and Cryptography | 2017
Rongmao Chen; Yi Mu; Guomin Yang; Willy Susilo; Fuchun Guo
\mathsf {CLR\text{- }eCK}
international conference on the theory and application of cryptology and information security | 2016
Rongmao Chen; Yi Mu; Guomin Yang; Willy Susilo; Fuchun Guo; Mingwu Zhang
computer and communications security | 2016
Willy Susilo; Rongmao Chen; Fuchun Guo; Guomin Yang; Yi Mu; Yang-Wai Chow
model, to capture challenge-dependent leakage attacks on both long-term secret key and ephemeral secret key i.e., randomness. Second, we propose a general framework for constructing one-round
Security and Communication Networks | 2016
Xiaofen Wang; Yi Mu; Rongmao Chen
Journal of Computer Science and Technology | 2016
Xiaofen Wang; Yi Mu; Rongmao Chen; Xiaosong Zhang
\mathsf {CLR\text{- }eCK}