logo

SCIENTIA SINICA Informationis, Volume 46 , Issue 8 : 939-968(2016) https://doi.org/10.1360/N112016-00090

Architecture and key technologies of cyberspace security

More info
  • ReceivedApr 9, 2016
  • AcceptedJun 17, 2016

Abstract

Cyberspace is a dynamic virtual space composed of various critical information infrastructure components including Internet, communication networks, cyber-physical systems, and industrial control networks. It also includes incorporates interaction among humans, machines, and things. Cyberspace security involves both the security of the information infrastructure and the security of various data that are generated, processed, transmitted, and stored. With the rapid development of new technologies, such as cloud computing, big data, cyber-physical systems, and quantum computing, cyberspace security is being confronted with a series of new threats and challenges. To this end, in this paper, a cyberspace security research framework comprising four horizontal layers and one vertical layer is first established, including physical security, system security, network security, data security, and the basics of the security theory applied in each layer. On this basis, several basic theories and key technologies for priority development are investigated. The associated research fields are fingerprinting- and channel characteristics-based device authentication and secure communication, virtualization security analysis and defense in cloud computing environments, user authentication technology on mobile smart devices, security technology for electric power industry control systems in network environments, anonymous communication and traffic analysis technology, and basic theory for modern cryptography and data security mechanism. Development trends in the research on future cyberspace security are also explored.


Funded by

国家自然科学基金(61320106007)

国家自然科学基金(61272054)

国家自然科学基金(61572130)

国家自然科学基金(61502100)

国家自然科学基金(61402104)

国家自然科学基金(61532013)


References

[1] Fang B X. A hierarchy model on the research fields of cyberspace security technology. Chinese J Netw Inf Secur, 2016, 1: 2-7 [方滨兴. 从层次角度看网络空间安全技术的覆盖领域. 网络与信息安全学报, 2016, 1: 2-7]. Google Scholar

[2] Li H, Zhang N. Suggestions on cyber security talents cultivation. Chinese J Netw Inf Secur, 2016, 1: 18-23 [李晖, 张宁. 网络空间安全学科人才培养之思考. 网络与信息安全学报, 2016, 1: 18-23]. Google Scholar

[3] Li J H, Qiu W D, Meng K, et al. Discipline construction and talents training of cyberspace security. J Inf Secur Res, 2015, 1: 149-154 [李建华, 邱卫东, 孟魁, 等. 网络空间安全一级学科内涵建设和人才培养思考. 信息安全研究, 2015, 1: 149-154]. Google Scholar

[4] Danev B, Zanetti D, Capkun S. On physical-layer identification of wireless devices. ACM Comput Surv, 2012, 45: 1-29. Google Scholar

[5] Tekbas Ö H, Serinken N, Üreten O. An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions. Canadian J Electr Comput Eng, 2004, 29: 203-209 CrossRef Google Scholar

[6] Rasmussen K B, Capkun S. Implications of radio fingerprinting on the security of sensor networks. In: Proceedings of the 3rd International Conference on Security and Privacy in Communications Networks and the Workshops, Nice, 2007. 331-340. Google Scholar

[7] Reising D R, Temple M A, Mendenhall M J. Improved wireless security for GMSK-based devices using RF fingerprinting. Int J Electron Secur Digit Foren, 2010, 3: 41-59 CrossRef Google Scholar

[8] Brik V, Banerjee S, Gruteser M, et al. Wireless device identification with radiometric signatures. In: Proceedings of the 14th ACM international conference on Mobile computing and networking, San Francisco, 2008. 116-127. Google Scholar

[9] Gerdes R M, Daniels T E, Mina M, et al. Device identification via analog signal fingerprinting: a matched filter approach. In: Proceedings of the Network and Distributed System Security Symposium, San Diego, 2006. 1-11. Google Scholar

[10] Gerdes R M, Mina M, Russell S F, et al. Physical-layer identification of wired Ethernet devices. IEEE Trans Inf Foren Secur, 2012, 7: 1339-1353 CrossRef Google Scholar

[11] Danev B, Heydt-Benjamin T S, Capkun S. Physical-layer identification of RFID devices. In: Proceedings of the 18th Conference on USENIX Security Symposium, Montreal, 2009. 199-214. Google Scholar

[12] Dey S, Roy N, Xu W, et al. AccelPrint: imperfections of accelerometers make smartphones trackable. In: Proceedings of the Network and Distributed System Security Symposium, San Diego, 2014. 1-16. Google Scholar

[13] Das A, Borisov N, Caesar M. Do you hear what I hear? fingerprinting smart devices through embedded acoustic components. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Arizona, 2014. 441-452. Google Scholar

[14] Zhou Z, Diao W, Liu X, et al. Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Arizona, 2014. 429-440. Google Scholar

[15] Maurer U M. Secret key agreement by public discussion from common information. IEEE Trans Inf Theory, 1993, 39: 733-742 CrossRef Google Scholar

[16] Mathur S, Trappe W, Mandayam N, et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, San Francisco, 2008. 128-139. Google Scholar

[17] Jana S, Premnath S N, Clark M, et al. On the effectiveness of secret key extraction from wireless signal strength in real environments. In: Proceedings of the 15th ACM international Conference on Mobile Computing and Networking, Beijing, 2009. 321-332. Google Scholar

[18] Patwari N, Croft J, Jana S, et al. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Trans Mobile Comput, 2010, 9: 17-30 CrossRef Google Scholar

[19] Liu H, Yang J, Wang Y, et al. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In: Proceedings of the 31st IEEE International Conference on Computer Communications, Orlando, 2012. 927-935. Google Scholar

[20] Yasukawa S, Iwai H, Sasaoka H. Adaptive key generation in secret key agreement scheme based on the channel characteristics in OFDM. In: Proceedings of International Symposium on Information Theory and its Applications, Auckland, 2008. 1-6. Google Scholar

[21] Sayeed A, Perrig A. Secure wireless communications: secret keys through multipath. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, 2008. 3013-3016. Google Scholar

[22] Wang Q, Su H, Ren K, et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In: Proceedings of the 30th IEEE International Conference on Computer Communications, Shanghai, 2011. 1422-1430. Google Scholar

[23] Liu Y, Draper S C, Sayeed A M. Exploiting channel diversity in secret key generation from multipath fading randomness. IEEE Trans Inf Foren Secur, 2012, 7: 1484-1497 CrossRef Google Scholar

[24] Chou T H, Draper S C, Sayeed A M. Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness. In: Proceedings of IEEE International Symposium on Information Theory, Austin, 2010. 2518--2522. Google Scholar

[25] Studnia I, Alata E, Deswarte Y, et al. Survey of security problems in cloud computing virtual machines. In: Proceedings of Computer and Electronics Security Applications Rendez-vous, Rennes, 2012. 61-74. Google Scholar

[26] Ferrie P. Attacks on more virtual machine emulators. Symantec Advanced Threat Res, 2007. 1-17. Google Scholar

[27] Ristenpart T, Tromer E, Shacham H, et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on Computer and communications security, Chicago, 2009. 199-212. Google Scholar

[28] King S T, Chen P M. SubVirt: implementing malware with virtual machines. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, 2006. 1-14. Google Scholar

[29] Nance K, Bishop M, Hay B. Virtual machine introspection: observation or interference? IEEE Secur Priv, 2008, 5: 32-37. Google Scholar

[30] Payne B D, Carbone M, Sharif M, et al. Lares: an architecture for secure active monitoring using virtualization. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, 2008. 233-247. Google Scholar

[31] Ibrahim A S, Hamlyn-Harris J, Grundy J, et al. CloudSec: a security monitoring appliance for Virtual Machines in the IaaS cloud model. In: Proceedings of the 5th International Conference on Network and System Security, Milan, 2011. 113-120. Google Scholar

[32] Yao F, Sprabery R, Campbell R H. CryptVMI: a flexible and encrypted virtual machine introspection system in the cloud. In: Proceedings of the 2nd international workshop on Security in cloud computing, Kyoto, 2014. 11-18. Google Scholar

[33] Seshadri A, Luk M, Qu N, et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In: Proceedings of the 21st ACM SIGOPS symposium on Operating systems principles, Washington, 2007. 335-350. Google Scholar

[34] Litty L, Lagar-Cavilla H A, Lie D. Hypervisor support for identifying covertly executing binaries. In: Proceedings of the 17th Conference on Security Symposium, Berkeley, 2008. 243-258. Google Scholar

[35] Wang Y D, Yang J H, Xu C, et al. Survey on access control technologies for cloud computing. J Soft, 2015, 26: 1129-1150 [王于丁, 杨家海, 徐聪, 等. 云计算访问控制技术研究综述. 软件学报, 2015, 26: 1129-1150]. Google Scholar

[36] Li X Y, Shi Y, Guo Y, et al. Multi-tenancy based access control in cloud. In: Proceedings of International Conference on Computational Intelligence and Software Engineering, Wuhan, 2010. 1-4. Google Scholar

[37] Tang B, Sandhu R, Li Q. Multi-tenancy authorization models for collaborative cloud services. Concurr Comput Pract Exper, 2015, 27: 2851-2868 CrossRef Google Scholar

[38] Kurmus A, Gupta M, Pletka R, et al. A comparison of secure multi-tenancy architectures for filesystem storage clouds. In: Proceedings of the 12th International Middleware Conference, Laxenburg, 2011. 460-479. Google Scholar

[39] Popa L, Yu M, Ko S Y, et al. CloudPolice: taking access control out of the network. In: Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, Monterey, 2010, 7. 1-6. Google Scholar

[40] Azab A M, Ning P, Wang Z, et al. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, 2010. 38-49. Google Scholar

[41] Wang Z, Jiang X. Hypersafe: a lightweight approach to provide lifetime hypervisor control-flow integrity. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, 2010. 380-395. Google Scholar

[42] Zhang F, Chen J, Chen H, et al. CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In: Proceedings of the 23rd ACM Symposium on Operating Systems Principles, Cascais, 2011. 203-216. Google Scholar

[43] Heiser G, Uhlig V, LeVasseur J. Are virtual-machine monitors microkernels done right? ACM SIGOPS Operating Syst Rev, 2006, 40: 95-99. Google Scholar

[44] Klein G, Elphinstone K, Heiser G, et al. seL4: formal verification of an OS kernel. In: Proceedings of the 22nd ACM SIGOPS Symposium on Operating Systems Principles, Big Sky, 2009. 207-220. Google Scholar

[45] Azab A M, Swidowski K, Bhutkar J M, et al. SKEE: a lightweight secure kernel-level execution environment for ARM. In: Proceedings of Network and Distributed System Security Symposium, San Diego, 2016. 1-15. Google Scholar

[46] Suh E, Ferraiuolo A, Wang Y, et al. Full-Processor Timing Channel Protection with Applications to Secure Hardware Compartments. Computing and Information Science Technical Reports, 2015. 1-15. Google Scholar

[47] Xia Y, Liu Y, Guan H, et al. Secure outsourcing of virtual appliance. IEEE Trans Cloud Comput, 2015, 99: 1-15. Google Scholar

[48] Ling Z, Luo J, Chen Q, et al. Secure fingertip mouse for mobile devices. In: Proceedings of the 35th Annual IEEE International Conference on Computer Communications, San Francisco, 2016. 1-9. Google Scholar

[49] Aviv A J, Gibson K, Mossop E, et al. Smudge attacks on smartphone touch screens. In: Proceedings of the 4th USENIX Workshop on Offensive Technologies, Washington, 2010. 1-10. Google Scholar

[50] Gao H, Ren Z, Chang X, et al. A new graphical password scheme resistant to shoulder-surfing. In: Proceedings of the International Conference on Cyberworlds, Singapore, 2010. 194-199. Google Scholar

[51] Kwon T, Na S. TinyLock: affordable defense against smudge attacks on smartphone pattern lock systems. Comput Secur, 2014, 42: 137-150 CrossRef Google Scholar

[52] Bojinov H, Boneh D. Mobile token-based authentication on a budget. In: Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, Phoenix, 2011. 14-19. Google Scholar

[53] Chen S, Pande A, Mohapatra P. Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones. In: Proceedings of the 12th International Conference on Mobile Systems, Applications, and Services, Bretton Woods, 2014. 109-122. Google Scholar

[54] Cheng K Y, Kumar A. Contactless finger knuckle identification using smartphones. In: Proceedings of the International Conference of the Biometrics Special Interest Group, Darmstadt, 2012. 1-6. Google Scholar

[55] Shabrina N, Akbar S, Ruswono P. Palmprint authentication in smartphone using phase-only correlation method. In: Proceedings of the 5th International Conference on Advanced Computer Science and Information Systems, Bali, 2013. 397-402. Google Scholar

[56] Raja K B, Raghavendra R, Stokkenes M, et al. Smartphone authentication system using periocular biometrics. In: Proceedings of the International Conference of the Biometrics Special Interest Group, Darmstadt, 2014. 1-8. Google Scholar

[57] de Luca A, Hang A, Brudy F, et al. Touch me once and I know it's you! implicit authentication based on touch screen patterns. In: Proceedings of the 30th ACM Conference on Human Factors in Computing Systems, Austin, 2012. 987-996. Google Scholar

[58] Clarke N L, Furnell S M. Authenticating mobile phone users using keystroke analysis. Int J Inf Secur, 2007, 6: 1-14. Google Scholar

[59] Giuffrida C, Majdanik K, Conti M, et al. I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics. In: Detection of Intrusions and Malware, and Vulnerability Assessment. Berlin: Springer, 2014. 92-111. Google Scholar

[60] Burgbacher U, Hinrichs K. An implicit author verification system for text messages based on gesture typing biometrics. In: Proceedings of the 32nd ACM Conference on Human Factors in Computing Systems, Toronto, 2014. 2951-2954. Google Scholar

[61] Derawi M O, Nickel C, Bours P, et al. Unobtrusive user-authentication on mobile phones using biometric gait recognition. In: Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, 2010. 306-311. Google Scholar

[62] Feng T, Liu Z, Kwon K A, et al. Continuous mobile authentication using touchscreen gestures. In: Proceedings of the IEEE Conference on Technologies for Homeland Security, Waltham, 2012. 451-456. Google Scholar

[63] Frank M, Biedert R, Ma E D, et al. Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Foren Secur, 2013, 8: 136-148 CrossRef Google Scholar

[64] Shen C, Zhang Y, Cai Z, et al. Touch-interaction behavior for continuous user authentication on smartphones. In: Proceedings of the 8th International Conference on Biometrics, Phuket, 2015. 157-162. Google Scholar

[65] Jakobsson M, Shi E, Golle P, et al. Implicit authentication for mobile devices. In: Proceedings of the 4th USENIX Workshop on Hot Topics in Security, Montreal, 2009. 9-14. Google Scholar

[66] Conti M, Zachia-Zlatea I, Crispo B. Mind how you answer me! In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, 2011. 249-259. Google Scholar

[67] McLaughlin S, Podkuiko D, McDaniel P. Energy theft in the advanced metering infrastructure. Crit Inf Infrastructures Secur, 2009, 6027: 176-187. Google Scholar

[68] Varodayan D P, Gao G X. Redundant metering for integrity with information-theoretic confidentiality. In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, 2010. 345-349. Google Scholar

[69] Liu N, Chen J, Zhu L, et al. A key management scheme for secure communications of advanced metering infrastructure in smart grid. IEEE Trans Ind Electron, 2013, 60: 4746-4756 CrossRef Google Scholar

[70] Diao F, Zhang F, Cheng X. A privacy-preserving smart metering scheme using linkable anonymous credential. IEEE Trans Ind Electron, 2015, 6: 461-467. Google Scholar

[71] Li F, Luo B, Liu P. Secure information aggregation for smart grids using homomorphic encryption. In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, 2010. 327-332. Google Scholar

[72] Li H, Mao R, Lai L, et al. Compressed meter reading for delay-sensitive and secure load report in smart grid. In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, 2010. 114-119. Google Scholar

[73] Rial A, Danezis G. Privacy-preserving smart metering. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, Chicago, 2011. 49-60. Google Scholar

[74] Ruj S, Nayak A. A decentralized security framework for data aggregation and access control in smart grids. IEEE Trans Ind Electron, 2013, 4: 196-205. Google Scholar

[75] Rottondi C, Verticale G, Capone A. Privacy-preserving smart metering with multiple data consumers. Comput Netw, 2013, 57: 1699-1713 CrossRef Google Scholar

[76] Birman K, Jelasity M, Kleinberg R, et al. Building a secure and privacy-preserving smart grid. ACM Special Interest Group Operating Syst Rev, 2015, 49: 131-136 CrossRef Google Scholar

[77] Yuan Y, Li Z, Ren K. Modeling load redistribution attacks in power systems. IEEE Trans Smart Grid, 2011, 2: 382-390 CrossRef Google Scholar

[78] Liu Y, Ning P, Reiter M K. False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur, 2011, 14: 1-33. Google Scholar

[79] Huang Y, Esmalifalak M, Nguyen H, et al. Bad data injection in smart grid: attack and defense mechanisms. IEEE Commun Mag, 2013, 51: 27-33. Google Scholar

[80] Yu Z H, Chin W L. Blind false data injection attack using pca approximation method in smart grid. IEEE Trans Smart Grid, 2015, 6: 1219-1226 CrossRef Google Scholar

[81] Bobba R B, Rogers K M, Wang Q, et al. Detecting false data injection attacks on dc state estimation. In: Proceedings of the 1st Workshop on Secure Control Systems, Stockholm, 2010. 1-9. Google Scholar

[82] Dán G, Sandberg H. Stealth attacks and protection schemes for state estimators in power systems. In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, 2010. 214-219. Google Scholar

[83] Liu L, Esmalifalak M, Ding Q, et al. Detecting false data injection attacks on power grid by sparse optimization. IEEE Trans Smart Grid, 2014, 5: 612-621 CrossRef Google Scholar

[84] Lu Z, Lu X, Wang W, et al. Review and evaluation of security threats on the communication networks in the smart grid. In: Proceedings of IEEE Military Communications Conference, San Jose, 2010. 1830-1835. Google Scholar

[85] Li H, Lai L, Qiu R C. Communication capacity requirement for reliable and secure state estimation in smart grid. In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, 2010. 191-196. Google Scholar

[86] Khurana H, Bobba R, Yardley T, et al. Design principles for power grid cyber-infrastructure authentication protocols. In: Proceedings of the 43rd Hawaii International Conference on System Sciences, Hawaii, 2010. 1-10. Google Scholar

[87] Yang M, Luo J, Ling Z, et al. De-anonymizing and countermeasures in anonymous communication networks. IEEE Commun Mag, 2015, 53: 60-66. Google Scholar

[88] Edman M, Syverson P. AS-awareness in tor path selection. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, 2009. 380-389. Google Scholar

[89] Murdoch S J, Zieliński P. Sampled traffic analysis by internet-exchange-level adversaries. In: Proceedings of the Privacy Enhancing Technologies, Berlin, 2007. 167-183. Google Scholar

[90] Johnson A, Wacek C, Jansen R, et al. Users get routed: traffic correlation on tor by realistic adversaries. In: Proceedings of the 20th ACM Conference on Computer and Communications Security, Berlin, 2013. 337-348. Google Scholar

[91] Bauer K, McCoy D, Grunwald D, et al. Low-resource routing attacks against Tor. In: Proceedings of the ACM Workshop on Privacy in the Electronic Society, Alexandria, 2007. 11-20. Google Scholar

[92] Pappas V, Athanasopoulos E, Ioannidis S, et al. Compromising anonymity using packet spinning. In: Proceedings of the 11th Information Security Conference, Taipei, 2008. 161-174. Google Scholar

[93] Yu W, Fu X, Graham S, et al. DSSS-based flow marking technique for invisible traceback. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, 2007. 18-32. Google Scholar

[94] Houmansadr A, Kiyavash N, Borisov N. RAINBOW: a robust and invisible non-blind watermark for network flows. In: Proceedings of the 16th Annual Network {&} Distributed System Security Symposium, San Diego, 2009. 1-13. Google Scholar

[95] Wang X, Luo J, Yang M. An interval centroid based spread spectrum watermark for tracing multiple network flows. In: Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, San Antonio, 2009. 4000-4006. Google Scholar

[96] Ling Z, Luo J, Yu W, et al. A new cell counter based attack against tor. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, 2009. 578-589. Google Scholar

[97] Ling Z, Luo J, Yu W, et al. Protocol-level attacks against tor. Comput Netw, 2013, 57: 869-886 CrossRef Google Scholar

[98] Ling Z, Fu X, Jia W, et al. Novel packet size-based covert channel attacks against anonymizer. IEEE Trans Comput, 2013, 62: 2411-2426 CrossRef Google Scholar

[99] Wang X, Luo J, Yang M, et al. A potential HTTP-based application-level attack against tor. Future Gener Comput Syst, 2011, 27: 67-77 CrossRef Google Scholar

[100] Chakravarty S, Barbera M V, Portokalidis G, et al. On the effectiveness of traffic analysis against anonymity networks using flow records. In: Proceedings of Passive and Active Measurement Conference, Los Angeles, 2014. 247-257. Google Scholar

[101] Hintz A. Fingerprinting websites using traffic analysis. In: Proceedings of the 2nd International Conference on Privacy Enhancing Technologies, San Francisco, 2002. 171-178. Google Scholar

[102] Liberatore M, Levine B N. Inferring the source of encrypted HTTP connections. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, 2006. 255-263. Google Scholar

[103] Panchenko A, Niessen L, Zinnen A, et al. Website fingerprinting in onion routing based anonymization networks. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, New York, 2011. 103-114. Google Scholar

[104] Cai X, Zhang X C, Joshi B, et al. Touching from a distance: website fingerprinting attacks and defenses. In: Proceedings of the ACM Conference on Computer and Communications Security, New York, 2012. 605-616. Google Scholar

[105] Wang T, Cai X, Nithyanand R, et al. Effective attacks and provable defenses for website fingerprinting. In: Proceedings of the 23rd USENIX Security Symposium, San Diego, 2014. 143-157. Google Scholar

[106] He G, Yang M, Gu X, et al. A novel active website fingerprinting attack against tor anonymous system. In: Proceedings of the 18th IEEE International Conference on Computer Supported Cooperative Work in Design, Hsinchu, 2014. 112-117. Google Scholar

[107] Bennett C H, Brassard G. Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computer System and Signal Processing, New York, 1984. 175-179. Google Scholar

[108] Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances. Science, 1999, 283: 2050-2056 CrossRef Google Scholar

[109] Ekert A K. Quantum cryptography based on Bell's theorem. Phys Rev Lett, 1991, 67: 661-663 CrossRef Google Scholar

[110] Bennett C H. Quantum cryptography using any two nonorthogonal states. Phys Rev Lett, 1992, 68: 3121-3124 CrossRef Google Scholar

[111] Peng C Z, Yang T, Bao X H, et al. Experimental free-space distribution of entangled photon pairs over 13 km: towards satellite-based global quantum communication. Phys Rev Lett, 2005, 94: 1-4. Google Scholar

[112] Peng C Z, Zhang J, Yang D, et al. Experimental long-distance decoy-state quantum key distribution based on polarization encoding. Phys Rev Lett, 2007, 98: 1-4. Google Scholar

[113] Jin X M, Ren J G. Experimental free-space quantum teleportation. Nature Photon, 2010, 4: 376-381 CrossRef Google Scholar

[114] Hoffstein J, Pipher J, Silverman J H. NTRU: a ring-based public key cryptosystem. In: Proceedings of the 3rd International Symposium on Algorithmic Number Theory, Portland, 1998. 267-288. Google Scholar

[115] Regev O. On lattices, learning with errors, random linear codes, and cryptography. J ACM, 2009, 56: 34-73. Google Scholar

[116] Gentry C. Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st ACM Symposium on Theory of Computing, Bethesda, 2009. 169-178. Google Scholar

[117] Agrawal S, Boneh D, Boyen X. Efficient lattice (H) IBE in the standard model. In: Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Riviera, 2010. 553-572. Google Scholar

[118] Lyubashevsky V. Lattice signatures without trapdoors. In: Proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, 2012. 738-755. Google Scholar

[119] Adleman L M. Molecular computation of solutions to combinatorial problems. Science, 1994, 266: 1021-1024 CrossRef Google Scholar

[120] Tang J, Cui Y, Li Q, et al. Ensuring security and privacy preservation for cloud data services. ACM Comput Surv, 2016, 49: 1-39. Google Scholar

[121] Rivest R L, Adleman L, Dertouzos M L. On data banks and privacy homomorphisms. Found Secure Comput, 1978, 4: 169-180. Google Scholar

[122] van Dijk M, Gentry C, Halevi S, et al. Fully homomorphic encryption over the integers. In: Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Riviera, 2010. 24-43. Google Scholar

[123] Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy, Berkeley, 2000. 44-55. Google Scholar

[124] Boneh D, Di Crescenzo G, Ostrovsky R, et al. Public key encryption with keyword search. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, 2004. 506-522. Google Scholar

[125] Cao N, Wang C, Li M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parall Distrib Syst, 2014, 25: 222-233 CrossRef Google Scholar

[126] Sahai A, Waters B. Fuzzy identity-based encryption. In: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, 2005. 457-473. Google Scholar

[127] Lewko A, Okamoto T, Sahai A, et al. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Riviera, 2010. 62-91. Google Scholar

[128] O'Neill A. Definitional issues in functional encryption. IACR Cryptology ePrint Archive, 2010. 1-11. Google Scholar

[129] Boneh D, Sahai A, Waters B. Functional encryption: definitions and challenges. Theory Cryptogr, 2011, 6597: 253-273 CrossRef Google Scholar

[130] Naveed M, Agrawal S, Prabhakaran M, et al. Controlled functional encryption. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Arizona, 2014. 1280-1291. Google Scholar

[131] David M, Ranasinghe D C, Larsen T. A2U2: a stream cipher for printed electronics RFID tags. In: Proceedings of IEEE International Conference on RFID, Orlando, 2011. 176-183. Google Scholar

[132] Saarinen M J O. The BlueJay ultra-lightweight hybrid cryptosystem. In: Proceedings of IEEE Symposium on Security and Privacy Workshops, San Francisco, 2012. 27-32. Google Scholar

[133] Gong Z. Survey on lightweight hash functions. J Cryptologic Res, 2016, 3: 1-11 [龚征. 轻量级Hash函数研究. 密码学报, 2016, 3: 1-11]. Google Scholar

[134] Bogdanov A, Kne\v{z}evi$\acute{\rm c}$ M, Leander G, et al. SPONGENT: a lightweight hash function. In: Proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, Nara, 2011. 312-325. Google Scholar

[135] Yoshida H, Watanabe D, Okeya K, et al. MAME: a compression function with reduced hardware requirements. In: Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, 2007. 148-165. Google Scholar

[136] Hirose S, Ideguchi K, Kuwakado H, et al. A lightweight 256-bit hash function for hardware and low-end devices: lesamnta-LW. In: Proceedings of the 13th International Conference on Information Security and Cryptology, Seoul, 2010. 151-168. Google Scholar

[137] Kuwakado H, Hirose S. Hashing mode using a lightweight blockcipher. In: Proceedings of the 14th IMA International Conference on Cryptography and Coding, Oxford, 2013. 213-231. Google Scholar

[138] Billet O, Robshaw M J B, Peyrin T. On building hash functions from multivariate quadratic equations. In: Proceedings of the 12th Australasian Conference Information Security and Privacy, Townsville, 2007. 82-95. Google Scholar

[139] Bettale L, Faugere J C, Perret L. Security analysis of multivariate polynomials for hashing. In: Proceedings of the 11th International Conference Information Security and Cryptology, Seoul, 2008. 115-124. Google Scholar

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备17057255号       京公网安备11010102003388号