Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

Faculty of Engineering and Information Sciences - Papers: Part B

Encryption

Articles 1 - 2 of 2

Full-Text Articles in Science and Technology Studies

Efficient Subversion Of Symmetric Encryption With Random Initialization Vector, Joon Sang Baek, Ilsun You Jan 2016

Efficient Subversion Of Symmetric Encryption With Random Initialization Vector, Joon Sang Baek, Ilsun You

Faculty of Engineering and Information Sciences - Papers: Part B

This paper presents an efficient subverted symmetric encryption scheme, which outputs a random initialization vector (IV). Compared with the available scheme of the same kind in the literature, our attack provides a saboteur (big brother) with much faster recovery of a key used in a victim's symmetric encryption scheme. Our result implies that care must be taken when a symmetric encryption scheme with a random IV such as randomized CBC is deployed.


Certificate-Based Encryption With Keyword Search Enabling Secure Authorization In Electronic Health Record, Clementine Gritti, Willy Susilo, Thomas Plantard Jan 2016

Certificate-Based Encryption With Keyword Search Enabling Secure Authorization In Electronic Health Record, Clementine Gritti, Willy Susilo, Thomas Plantard

Faculty of Engineering and Information Sciences - Papers: Part B

In an e-Health scenario, we study how the practitioners are authorized when they are requesting access to medical documents containing sensitive information. Consider the following scenario. A clinician wants to access and retrieve a patient's Electronic Health Record (EHR), and this means that the clinician must acquire sufficient access right to access this document. As the EHR is within a collection of many other patients, the clinician would need to specify some requirements (such as a keyword) which match the patient's record, as well as having a valid access right. The complication begins when we do not want the server …