Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yichen Zhang is active.

Publication


Featured researches published by Yichen Zhang.


International Journal of Information Security | 2015

Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation

Huiling Qian; Jiguo Li; Yichen Zhang; Jinguang Han

Personal health record (PHR) service is an emerging model for health information exchange. In PHR systems, patient’s health records and information are maintained by the patient himself through the Web. In reality, PHRs are often outsourced to be stored at the third parties like cloud service providers. However, there have been serious privacy concerns about cloud service as it may expose user’s sensitive data like PHRs to those cloud service providers or unauthorized users. Using attribute-based encryption (ABE) to encrypt patient’s PHRs in cloud environment, secure and flexible access control can be achieved. Yet, problems like scalability in key management, fine-grained access control, and efficient user revocation remain to be addressed. In this paper, we propose a privacy-preserving PHR, which supports fine-grained access control and efficient revocation. To be specific, our scheme achieves the goals (1) scalable and fine-grained access control for PHRs by using multi-authority ABE scheme, and (2) efficient on-demand user/attribute revocation and dynamic policy update. In our scheme, we consider the situation that multiple data owners exist, and patient’s PHRs are encrypted and stored in semi-trust servers. The access structure in our scheme is expressive access tree structure, and the security of our scheme can be reduced to the standard decisional bilinear Diffie–Hellman assumption.


IEEE Transactions on Services Computing | 2017

KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage

Jiguo Li; Xiaonan Lin; Yichen Zhang; Jinguang Han

Cloud computing becomes increasingly popular for data owners to outsource their data to public cloud servers while allowing intended data users to retrieve these data stored in cloud. This kind of computing model brings challenges to the security and privacy of data stored in cloud. Attribute-based encryption (ABE) technology has been used to design fine-grained access control system, which provides one good method to solve the security issues in cloud setting. However, the computation cost and ciphertext size in most ABE schemes grow with the complexity of the access policy. Outsourced ABE (OABE) with fine-grained access control system can largely reduce the computation cost for users who want to access encrypted data stored in cloud by outsourcing the heavy computation to cloud service provider (CSP). However, as the amount of encrypted files stored in cloud is becoming very huge, which will hinder efficient query processing. To deal with above problem, we present a new cryptographic primitive called attribute-based encryption scheme with outsourcing key-issuing and outsourcing decryption, which can implement keyword search function (KSF-OABE). The proposed KSF-OABE scheme is proved secure against chosen-plaintext attack (CPA). CSP performs partial decryption task delegated by data user without knowing anything about the plaintext. Moreover, the CSP can perform encrypted keyword search without knowing anything about the keywords embedded in trapdoor.


IEEE Transactions on Services Computing | 2017

Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing

Jiguo Li; Wei Yao; Yichen Zhang; Huiling Qian; Jinguang Han

With the development of cloud computing, outsourcing data to cloud server attracts lots of attentions. To guarantee the security and achieve flexibly fine-grained file access control, attribute based encryption (ABE) was proposed and used in cloud storage system. However, user revocation is the primary issue in ABE schemes. In this article, we provide a ciphertext-policy attribute based encryption (CP-ABE) scheme with efficient user revocation for cloud storage system. The issue of user revocation can be solved efficiently by introducing the concept of user group. When any user leaves, the group manager will update users’ private keys except for those who have been revoked. Additionally, CP-ABE scheme has heavy computation cost, as it grows linearly with the complexity for the access structure. To reduce the computation cost, we outsource high computation load to cloud service providers without leaking file content and secret keys. Notably, our scheme can withstand collusion attack performed by revoked users cooperating with existing users. We prove the security of our scheme under the divisible computation Diffie-Hellman assumption. The result of our experiment shows computation cost for local devices is relatively low and can be constant. Our scheme is suitable for resource constrained devices.


Security and Communication Networks | 2016

Provably secure identity‐based encryption resilient to post‐challenge continuous auxiliary input leakage

Jiguo Li; Yuyan Guo; Qihong Yu; Yang Lu; Yichen Zhang

The situation for post-challenge continuous auxiliary input leakage has not been considered in the cryptography schemes for previous literature. We present a semantic-security model with post-challenge continuous auxiliary inputs for identity-based encryption. In this model, the adversary is permitted to obtain some information of the private keys constantly and to query more information after seeing the challenge ciphertext through the side-channel attacks. Furthermore, we present an identity-based encryption scheme resilient to leakage under composite order groups. Our scheme is secure against post-challenge continuous auxiliary input, adaptive chosen-identity, and adaptive chosen plaintext attacks under three static assumptions in the standard model. Compared with existing identity-based encryption schemes under security properties and performance, our scheme is practical. Copyright


Information Sciences | 2016

Continuous leakage-resilient certificate-based encryption

Jiguo Li; Yuyan Guo; Qihong Yu; Yang Lu; Yichen Zhang; Futai Zhang

Encryption schemes are generally considered to be secure in an ideal environment, where the adversary cannot obtain the secret internal state of schemes. However, in the realistic environment, the adversary can gain partial information about decryption private key through various types of side channel attacks. In order to capture these attacks, it is crucial to design encryption schemes which are resilient to leakage. In this article, we first formalize a continuous leakage-resilient security model of certificate-based encryption. In the model, the adversary continuously obtains partial information about the secret states through the continuous leakage attacks. Furthermore, we construct a continuous leakage-resilient certificate-based encryption (CLR-CBE) scheme which is resilient to continuous leakage, and it is secure against adaptive chosen ciphertext attacks under the bilinear Diffie-Hellman inversion (BDHI) hardness assumption. Lastly, we show the bound on leakage and make comparison between proposed and existing schemes in terms of security properties and efficiency.


IEEE Transactions on Information Forensics and Security | 2017

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage

Hao Yan; Jiguo Li; Jinguang Han; Yichen Zhang

As an important application in cloud computing, cloud storage offers user scalable, flexible, and high-quality data storage and computation services. A growing number of data owners choose to outsource data files to the cloud. Because cloud storage servers are not fully trustworthy, data owners need dependable means to check the possession for their files outsourced to remote cloud servers. To address this crucial problem, some remote data possession checking (RDPC) protocols have been presented. But many existing schemes have vulnerabilities in efficiency or data dynamics. In this paper, we provide a new efficient RDPC protocol based on homomorphic hash function. The new scheme is provably secure against forgery attack, replace attack, and replay attack based on a typical security model. To support data dynamics, an operation record table (ORT) is introduced to track operations on file blocks. We further give a new optimized implementation for the ORT, which makes the cost of accessing ORT nearly constant. Moreover, we make the comprehensive performance analysis, which shows that our scheme has advantages in computation and communication costs. Prototype implementation and experiments exhibit that the scheme is feasible for real applications.


international conference on information and communication security | 2013

Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure

Huiling Qian; Jiguo Li; Yichen Zhang

To make multi-authority ABE schemes collusion-resistant, a user in the system must be tied with a globally verifiable identifier GID. The drawback of this approach is that it compromises the users privacy. Malicious authorities can collect users attributes by tracing the user GID, thus compromises the privacy of the user. The other privacy concern is access structures that sent along with ciphertext in traditional CP-ABE schemes may have sensitive information. In this paper, we propose a multi-authority ABE scheme with fully hidden access structure that authorities can get nothing about user GID when generating and issuing user private keys and access structures are hidden to receivers. We prove the security of our scheme under a standard complexity assumption of decisional bilinear Diffie-Hellman (DBDH) assumption. The access structure we used in our scheme is AND, OR gates on multi-valued attributes.


IEEE Systems Journal | 2018

User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage

Jiguo Li; Wei Yao; Jinguang Han; Yichen Zhang; Jian Shen

Attribute-based encryption (ABE) can guarantee confidentiality and achieve fine-grained data access control in a cloud storage system. Due to the fact that every attribute in ABE may be shared by multiple users and each user holds multiple attributes, any single-attribute revocation for some user may affect the other users with the same attribute in the system. Therefore, how to revoke attribute efficiently is an important and challenging problem in ABE schemes. In order to solve above problems, we first give a concrete attack to the existing ABE scheme with attribute revocation. Then, we formalize the definition and security model, which model collusion attack executed by the existing users cooperating with the revoked users. Finally, we present a user collusion avoidance ciphertext-policy ABE scheme with efficient attribute revocation for the cloud storage system. The problem of attribute revocation is solved efficiently by exploiting the concept of an attribute group. When an attribute is revoked from a user, the group manager updates other users’ secret keys. Furthermore, we prove that the proposed scheme is secure against collusion attack launched by the existing users and the revoked users. The security of the proposed scheme is reduced to the computational Diffie–Hellman assumption.


Security and Communication Networks | 2016

Hierarchical attribute‐based encryption with continuous auxiliary inputs leakage

Yuyan Guo; Jiguo Li; Yichen Zhang; Jian Shen

The continuous auxiliary inputs leakage is more strong side-channel attacks. In this article, we first propose a continuous auxiliary inputs leakage model for the hierarchical attribute-based encryption scheme. Under the security model, an adversary has ability to gain partial updated master keys and updated secret keys continually by certain leakage attacks. Moreover, a resilient-leakage hierarchical attribute-based encryption scheme is constructed. The security proof for this scheme is provided under the standard model. Furthermore, we give the performance comparison between our scheme and relevant scheme. Copyright


Information Sciences | 2018

Identity-based Broadcast Encryption with Continuous Leakage Resilience

Jiguo Li; Qihong Yu; Yichen Zhang

Abstract Identity-based broadcast encryption (IBBE) is an important type of broadcast encryption. In the paper, we put forward the formal definition and security model of IBBE with leakage-resilience. Furthermore, we propose an IBBE scheme with continuous leakage-resilience. The presented scheme is resilient to private key leakage. By refreshing the private key, our scheme can resist continuous private key leakage. Based on dual system encryption technique, we prove the security of the proposed scheme under subgroup decisional assumptions. We give the specific performance analysis of leakage-resilience. The relative leakage ratio can amount to 1/3.

Collaboration


Dive into the Yichen Zhang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jinguang Han

Nanjing University of Finance and Economics

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jian Shen

Nanjing University of Information Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Futai Zhang

Nanjing Normal University

View shared research outputs
Researchain Logo
Decentralizing Knowledge