Open Access
ARTICLE
Yepeng Liu1, 2, Yongjun Ren1, 2, *, Qirun Wang3, Jinyue Xia4
Journal of Cyber Security, Vol.2, No.1, pp. 1-8, 2020, DOI:10.32604/jcs.2020.05878
Abstract With the diversification of electronic devices, cloud-based services have
become the link between different devices. As a cryptosystem with secure conversion
function, proxy re-encryption enables secure sharing of data in a cloud environment.
Proxy re-encryption is a public key encryption system with ciphertext security conversion
function. A semi-trusted agent plays the role of ciphertext conversion, which can convert
the user ciphertext into the same plaintext encrypted by the principal’s public key. Proxy
re-encryption has been a hotspot in the field of information security since it was proposed
by Blaze et al. [Blaze, Bleumer and Strauss (1998)]. After 20 years of… More >
Open Access
ARTICLE
Lei Li1, Chungen Xu1, *, Xiaoling Yu1, Bennian Dou1, Cong Zuo2
Journal of Cyber Security, Vol.2, No.1, pp. 9-23, 2020, DOI:10.32604/jcs.2020.06313
Abstract Searchable encryption technology makes it convenient to search encrypted
data with keywords for people. A data owner shared his data with other users on the
cloud server. For security, it is necessary for him to build a fine-grained and flexible
access control mechanism. The main idea of this paper is to let the owner classify his data
and then authorizes others according to categories. The cloud server maintains a
permission matrix, which will be used to verify whether a trapdoor is valid or not. In this
way we can achieve access control and narrow the search range at the same… More >
Open Access
ARTICLE
Jianwei Zhang1, Ze Qin1, Shunfeng Wang1, *
Journal of Cyber Security, Vol.2, No.1, pp. 25-36, 2020, DOI:10.32604/jcs.2020.06429
Abstract Digital images have been applied to various areas such as evidence in courts.
However, it always suffers from noise by criminals. This type of computer network
security has become a hot issue that can’t be ignored. In this paper, we focus on noise
removal so as to provide guarantees for computer network security. Firstly, we introduce
a well-known denoising method called Expected Patch Log Likelihood (EPLL) with
Gaussian Mixture Model as its prior. This method achieves exciting results in noise
removal. However, there remain problems to be solved such as preserving the edge and
meaningful details in image denoising, cause… More >
Open Access
ARTICLE
Han Jin1, Shi Jin2, *, Junfeng Wu2
Journal of Cyber Security, Vol.2, No.1, pp. 37-48, 2020, DOI:10.32604/jcs.2020.07209
Abstract Most existing 2-dimensional barcodes are designed with a fixed shape and
clear area. Having a fixed shape and clear area makes the barcode difficult to lay out with
other text and pictures. To solve this problem, an amorphous 2-dimensional barcode is
presented in this paper. The barcode uses encoding graph units to encode data. There are
two key points in a 2-dimensional barcode: One is the encoding graph unit, the other is its
encoding rules. Because encoding graph units of a 2-dimensional barcode are surrounded
by other graphics, the units should be self-positioned and distinguished from other units.
This paper… More >
Open Access
ARTICLE
Leqi Jiang1, 2, Zhangjie Fu1, 2, *
Journal of Cyber Security, Vol.2, No.1, pp. 49-61, 2020, DOI:10.32604/jcs.2020.09308
Abstract Genetic Algorithm (GA) has been widely used to solve various optimization
problems. As the solving process of GA requires large storage and computing resources,
it is well motivated to outsource the solving process of GA to the cloud server. However,
the algorithm user would never want his data to be disclosed to cloud server. Thus, it is
necessary for the user to encrypt the data before transmitting them to the server. But the
user will encounter a new problem. The arithmetic operations we are familiar with cannot
work directly in the ciphertext domain. In this paper, a privacy-preserving outsourced
genetic… More >