Pors: proofs of retrievability for large files
- A. Juels, B. Kaliski
- Computer ScienceConference on Computer and Communications…
- 28 October 2007
In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier) can retrieve a…
A Fuzzy Vault Scheme
Fuzzy vaults have potential application to the problem of protecting data in a number of real-world, error-prone environments and also to biometric authentication systems, in which readings are inherently noisy as a result of the refractory nature of image capture and processing.
RFID security and privacy: a research survey
- A. Juels
- BusinessIEEE Journal on Selected Areas in Communications
- 1 September 2006
This survey examines approaches proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work.
Stealing Machine Learning Models via Prediction APIs
- Florian Tramèr, Fan Zhang, A. Juels, M. Reiter, T. Ristenpart
- Computer ScienceUSENIX Security Symposium
- 10 August 2016
Simple, efficient attacks are shown that extract target ML models with near-perfect fidelity for popular model classes including logistic regression, neural networks, and decision trees against the online services of BigML and Amazon Machine Learning.
A fuzzy commitment scheme
- A. Juels, M. Wattenberg
- Computer ScienceConference on Computer and Communications…
- 1 November 1999
Because the fuzzy commitment scheme is tolerant of error, it is capable of protecting biometric data just as conventional cryptographic techniques, like hash functions, are used to protect alphanumeric passwords.
Coercion-resistant electronic elections
- A. Juels, D. Catalano, M. Jakobsson
- Computer Science, MathematicsWorkshop on Privacy in the Electronic Society
- 7 November 2005
A model for electronic election schemes that involves a more powerful adversary than previous work that allows the adversary to demand of coerced voters that they vote in a particular manner, abstain from voting, or even disclose their secret keys.
Authenticating Pervasive Devices with Human Protocols
- A. Juels, Stephen A. Weis
- Computer ScienceAnnual International Cryptology Conference
- 14 August 2005
This paper analyzes a particular human-to-computer authentication protocol designed by Hopper and Blum (HB), and shows it to be practical for low-cost pervasive devices, and proves the security of the HB+ protocol against active adversaries based on the hardness of the Learning Parity with Noise (LPN) problem.
HAIL: a high-availability and integrity layer for cloud storage
- Kevin D. Bowers, A. Juels, Alina Oprea
- Computer Science, MathematicsConference on Computer and Communications…
- 9 November 2009
A strong, formal adversarial model for HAIL is proposed, and rigorous analysis and parameter choices are proposed that improve on the security and efficiency of existing tools, like Proofs of Retrievability deployed on individual servers.
Defining Strong Privacy for RFID
- A. Juels, Stephen A. Weis
- Computer Science, MathematicsFifth Annual IEEE International Conference on…
- 19 March 2007
A simple, formal definition of strong privacy is proposed useful for basic analysis of RFID systems, as well as a different (weaker) definition applicable to multi-verifier systems.
Cross-VM side channels and their use to extract private keys
- Yinqian Zhang, A. Juels, M. Reiter, T. Ristenpart
- Computer ScienceConference on Computer and Communications…
- 16 October 2012
This paper details the construction of an access-driven side-channel attack by which a malicious virtual machine (VM) extracts fine-grained information from a victim VM running on the same physical computer and demonstrates the attack in a lab setting by extracting an ElGamal decryption key from a victims using the most recent version of the libgcrypt cryptographic library.
...
...