Author pages are created from data sourced from our academic publisher partnerships and public sources.
Share This Author
Pors: proofs of retrievability for large files
In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier) can retrieve a…
RFID security and privacy: a research survey
- A. Juels
- Computer ScienceIEEE Journal on Selected Areas in Communications
- 1 September 2006
This survey examines approaches proposed by scientists for privacy protection and integrity assurance in RFID systems, and treats the social and technical context of their work.
A Fuzzy Vault Scheme
Fuzzy vaults have potential application to the problem of protecting data in a number of real-world, error-prone environments and also to biometric authentication systems, in which readings are inherently noisy as a result of the refractory nature of image capture and processing.
A fuzzy commitment scheme
Because the fuzzy commitment scheme is tolerant of error, it is capable of protecting biometric data just as conventional cryptographic techniques, like hash functions, are used to protect alphanumeric passwords.
Stealing Machine Learning Models via Prediction APIs
- Florian Tramèr, F. Zhang, A. Juels, M. Reiter, T. Ristenpart
- Computer Science, MathematicsUSENIX Security Symposium
- 10 August 2016
Simple, efficient attacks are shown that extract target ML models with near-perfect fidelity for popular model classes including logistic regression, neural networks, and decision trees against the online services of BigML and Amazon Machine Learning.
Authenticating Pervasive Devices with Human Protocols
This paper analyzes a particular human-to-computer authentication protocol designed by Hopper and Blum (HB), and shows it to be practical for low-cost pervasive devices, and proves the security of the HB+ protocol against active adversaries based on the hardness of the Learning Parity with Noise (LPN) problem.
HAIL: a high-availability and integrity layer for cloud storage
A strong, formal adversarial model for HAIL is proposed, and rigorous analysis and parameter choices are proposed that improve on the security and efficiency of existing tools, like Proofs of Retrievability deployed on individual servers.
Coercion-resistant electronic elections
A model for electronic election schemes that involves a more powerful adversary than previous work that allows the adversary to demand of coerced voters that they vote in a particular manner, abstain from voting, or even disclose their secret keys.
The blocker tag: selective blocking of RFID tags for consumer privacy
This work proposes the use of "selective blocking" by "blocker tags" as a way of protecting consumers from unwanted scanning of RFID tags attached to items they may be carrying or wearing, and believes that this approach provides a very attractive alternative for addressing privacy concerns raised by the potential (and likely) widespread use ofRFID tags in consumer products.
Cross-VM side channels and their use to extract private keys
This paper details the construction of an access-driven side-channel attack by which a malicious virtual machine (VM) extracts fine-grained information from a victim VM running on the same physical computer and demonstrates the attack in a lab setting by extracting an ElGamal decryption key from a victims using the most recent version of the libgcrypt cryptographic library.