Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Rongmao Chen is active.

Publication


Featured researches published by Rongmao Chen.


IEEE Transactions on Information Forensics and Security | 2016

Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage

Rongmao Chen; Yi Mu; Guomin Yang; Fuchun Guo; Xiaofen Wang

Searchable encryption is of increasing interest for protecting the data privacy in secure searchable cloud storage. In this paper, we investigate the security of a well-known cryptographic primitive, namely, public key encryption with keyword search (PEKS) which is very useful in many applications of cloud storage. Unfortunately, it has been shown that the traditional PEKS framework suffers from an inherent insecurity called inside keyword guessing attack (KGA) launched by the malicious server. To address this security vulnerability, we propose a new PEKS framework named dual-server PEKS (DS-PEKS). As another main contribution, we define a new variant of the smooth projective hash functions (SPHFs) referred to as linear and homomorphic SPHF (LH-SPHF). We then show a generic construction of secure DS-PEKS from LH-SPHF. To illustrate the feasibility of our new framework, we provide an efficient instantiation of the general framework from a Decision Diffie-Hellman-based LH-SPHF and show that it can achieve the strong security against inside the KGA.


IEEE Transactions on Information Forensics and Security | 2015

BL-MLE: Block-Level Message-Locked Encryption for Secure Large File Deduplication

Rongmao Chen; Yi Mu; Guomin Yang; Fuchun Guo

Deduplication is a popular technique widely used to save storage spaces in the cloud. To achieve secure deduplication of encrypted files, Bellare et al. formalized a new cryptographic primitive named message-locked encryption (MLE) in Eurocrypt 2013. Although an MLE scheme can be extended to obtain secure deduplication for large files, it requires a lot of metadata maintained by the end user and the cloud server. In this paper, we propose a new approach to achieve more efficient deduplication for (encrypted) large files. Our approach, named block-level message-locked encryption (BL-MLE), can achieve file-level and block-level deduplication, block key management, and proof of ownership simultaneously using a small set of metadata. We also show that our BL-MLE scheme can be easily extended to support proof of storage, which makes it multi-purpose for secure cloud storage.


australasian conference on information security and privacy | 2015

A New General Framework for Secure Public Key Encryption with Keyword Search

Rongmao Chen; Yi Mu; Guomin Yang; Fuchun Guo; Xiaofen Wang

Public Key Encryption with Keyword Search (PEKS), introduced by Boneh et al. in Eurocrypt’04, allows users to search encrypted documents on an untrusted server without revealing any information. This notion is very useful in many applications and has attracted a lot of attention by the cryptographic research community. However, one limitation of all the existing PEKS schemes is that they cannot resist the Keyword Guessing Attack (KGA) launched by a malicious server. In this paper, we propose a new PEKS framework named Dual-Server Public Key Encryption with Keyword Search (DS-PEKS). This new framework can withstand all the attacks, including the KGA from the two untrusted servers, as long as they do not collude. We then present a generic construction of DS-PEKS using a new variant of the Smooth Projective Hash Functions (SPHFs), which is of independent interest.


the cryptographers track at the rsa conference | 2016

Strongly Leakage-Resilient Authenticated Key Exchange

Rongmao Chen; Yi Mu; Guomin Yang; Willy Susilo; Fuchun Guo

Authenticated Key Exchange AKE protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the following contributions. First, we revisit the security modelling of leakage-resilient AKE protocols, and show that the existing models either impose some unnatural restrictions or do not sufficiently capture leakage attacks in reality. We then introduce a new strong yet meaningful security model, named challenge-dependent leakage-resilient eCK


IEEE Transactions on Information Forensics and Security | 2016

Server-Aided Public Key Encryption With Keyword Search

Rongmao Chen; Yi Mu; Guomin Yang; Fuchun Guo; Xinyi Huang; Xiaofen Wang; Yongjun Wang


Designs, Codes and Cryptography | 2017

Strong authenticated key exchange with auxiliary inputs

Rongmao Chen; Yi Mu; Guomin Yang; Willy Susilo; Fuchun Guo

\mathsf {CLR\text{- }eCK}


international conference on the theory and application of cryptology and information security | 2016

Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions

Rongmao Chen; Yi Mu; Guomin Yang; Willy Susilo; Fuchun Guo; Mingwu Zhang


computer and communications security | 2016

Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext

Willy Susilo; Rongmao Chen; Fuchun Guo; Guomin Yang; Yi Mu; Yang-Wai Chow

model, to capture challenge-dependent leakage attacks on both long-term secret key and ephemeral secret key i.e., randomness. Second, we propose a general framework for constructing one-round


Security and Communication Networks | 2016

An efficient privacy-preserving aggregation and billing protocol for smart grid

Xiaofen Wang; Yi Mu; Rongmao Chen


Journal of Computer Science and Technology | 2016

Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group

Xiaofen Wang; Yi Mu; Rongmao Chen; Xiaosong Zhang

\mathsf {CLR\text{- }eCK}

Collaboration


Dive into the Rongmao Chen's collaboration.

Top Co-Authors

Avatar

Yi Mu

Information Technology University

View shared research outputs
Top Co-Authors

Avatar

Fuchun Guo

Information Technology University

View shared research outputs
Top Co-Authors

Avatar

Guomin Yang

University of Wollongong

View shared research outputs
Top Co-Authors

Avatar

Willy Susilo

University of Wollongong

View shared research outputs
Top Co-Authors

Avatar

Jianchang Lai

Information Technology University

View shared research outputs
Top Co-Authors

Avatar

Xiaofen Wang

University of Electronic Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Mingwu Zhang

Hubei University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Peng Jiang

Beijing University of Posts and Telecommunications

View shared research outputs
Researchain Logo
Decentralizing Knowledge