Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Rupeng Yang is active.

Publication


Featured researches published by Rupeng Yang.


Future Generation Computer Systems | 2018

Towards leakage-resilient fine-grained access control in fog computing

Zuoxia Yu; Man Ho Au; Qiuliang Xu; Rupeng Yang; Jinguang Han

Fog Computing, a technology that takes advantage of both the paradigms of Cloud Computing and the Internet of Things, has a great advantage in reducing the communication cost. Since its introduction, fog computing has found a lot of applications, including, for instance, connected vehicles, wireless sensors, smart cities and etc. One prominent problem in fog computing is how fine-grained access control can be imposed. Functional encryption, a new cryptographic primitive, is known to support fine-grained access control. However, when it comes to some new threats in the fog computing scenario, such as side channel attacks, functional encryption cannot maintain its security. Therefore, we need new cryptographic primitives that not only provide a way to securely share data with a fine-grained access control but also are able to resist those new threats.In this paper, we consider how to construct functional encryption schemes (FEs) adaptively secure in continual memory leakage model (CML), which is one of the strongest models that allows continuous leakage on both user and master secret keys. Besides providing privacy and fine-grained access control in fog computing, our scheme can also guarantee security against side channel attacks. More concretely, we propose a generic framework for constructing fully secure leakage-resilient FEs (LR-FEs) in the CML model results from leakage-resilient pair encoding, which is an extension of pair encoding presented in the recent work of Attrapadung. In this way, our framework simplifies the design and analysis of LR-FEs into the design and analysis of predicate encodings. Moreover, we discover new adaptively secure LR-FEs, including FE for regular languages, attribute-based encryption (ABE) for large universe and ABE with short ciphertext. Above all, leakage-resilient adaptively secure functional encryption schemes can equip fog computing with higher security and fine-grained access control. Provide access control in fog computing secure against side-channel attacks.Develop a generic framework of leakage-resilient functional encryptions, a basic tool.Present many new fully secure leakage-resilient functional encryptions.


Security and Communication Networks | 2016

Public-key encryption with keyword search secure against continual memory attacks

Chengyu Hu; Rupeng Yang; Pengtao Liu; Zuoxia Yu; Yongbin Zhou; Qiuliang Xu

Continual memory attacks, inspired by recent realistic physical attacks, have broken many cryptographic schemes that were considered secure in traditional cryptography model. In this paper, we consider the continual memory leakage resilience in public-key encryption with keyword search scheme (PEKS). We give the definition of continual memory leakage resilience security for PEKS, which allows continual secret key leakage in the trapdoor generation algorithm rather than leakage of trapdoor itself. We believe that the definition is more suitable for practical PEKS scenario. To construct a concrete PEKS scheme secure against continual memory attacks, we firstly obtain a continual master-key leakage-resilient anonymous identity-based encryption (IBE) scheme by applying the generic tool provided by Lewko et al. to a fully secure anonymous IBE scheme that comes from the fully secure anonymous hierarchical identity-based encryption (HIBE) scheme of De Caro and colleagues. Then, we transform our continual master-key leakage-resilient anonymous IBE scheme to a PEKS scheme using the generic Anonymous IBE-to-PEKS transformation and prove its continual leakage-resilient security. Copyright


security and cryptography for networks | 2018

Unforgeable Watermarking Schemes with Public Extraction

Rupeng Yang; Man Ho Au; Junzuo Lai; Qiuliang Xu; Zuoxia Yu

A watermarking scheme consists of a marking algorithm allowing one to embed some information into a program while preserving its functionality and an extraction algorithm enabling one to extract embedded information from a marked program. The main security properties of watermarking schemes include unremovability and unforgeability. However, all current watermarking schemes achieving both properties simultaneously require the extraction algorithm to access either the marking secret key or the latest state maintained by the marking algorithm. As a result, to extract information embedded in a marked program, one must communicate with a third party. This greatly limits the applicability of current watermarking schemes. In this paper, we solve this problem by presenting the first (stateless) publicly extractable watermarking scheme with unremovability and unforgeability.


computer and communications security | 2018

Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption

Zuoxia Yu; Man Ho Au; Rupeng Yang; Junzuo Lai; Qiuliang Xu

Outsourcing the decryption of attribute-based encryption (ABE) ciphertext is a promising way to tackle the question of how users can perform decryption efficiently. However, existing solutions require the type of the target ciphertext to be determined at the setup of the outsourcing scheme. As such, making the target cryptosystems (or the clients) to be versatile becomes an issue that warrants investigations. In this paper, the problem we wish to tackle is to transform an ABE ciphertext to any client who is using the same, or possibly different, public-key encryption (PKE) system with the sender. The problem is of practical interest since it is hard to require all clients to use the same PKE, especially in the case of remote and cross-system data sharing. In addition, we also consider whether robust client-side decryption scheme can be adopted. This feature is not supported in the existing ABE with outsourcing. We introduce cross-system proxy re-encryptions (CS-PRE), a new re-encryption paradigm in which a semi-trusted proxy converts a ciphertext of a source cryptosystem (


australasian conference on information security and privacy | 2018

Lattice-Based Universal Accumulator with Nonmembership Arguments.

Zuoxia Yu; Man Ho Au; Rupeng Yang; Junzuo Lai; Qiuliang Xu

¶i_0


australasian conference on information security and privacy | 2018

Decentralized Blacklistable Anonymous Credentials with Reputation

Rupeng Yang; Man Ho Au; Qiuliang Xu; Zuoxia Yu

) into a ciphertext for a target cryptosystem (


international conference on information and communication security | 2017

Practical Range Proof for Cryptocurrency Monero with Provable Security

Kang Li; Rupeng Yang; Man Ho Au; Qiuliang Xu

¶i


Future Generation Computer Systems | 2018

Position based cryptography with location privacy

Rupeng Yang; Qiuliang Xu; Man Ho Au; Zuoxia Yu; Hao Wang; Lu Zhou

). We formalize CS-PRE and present a construction that performs well in the following aspects. (1)Versatility:


european symposium on research in computer security | 2015

Updatable Hash Proof System and Its Applications

Rupeng Yang; Qiuliang Xu; Yongbin Zhou; Rui Zhang; Chengyu Hu; Zuoxia Yu

¶i_0


australasian conference on information security and privacy | 2016

Leakage-Resilient Functional Encryption via Pair Encodings

Zuoxia Yu; Man Ho Au; Qiuliang Xu; Rupeng Yang; Jinguang Han

can be any attribute-based encryption (ABE) within Attrapadungs pair encoding framework.

Collaboration


Dive into the Rupeng Yang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Man Ho Au

Hong Kong Polytechnic University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yongbin Zhou

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jinguang Han

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Guangjun Fan

Chinese Academy of Sciences

View shared research outputs
Researchain Logo
Decentralizing Knowledge