首页 > 最新文献

IEEE Transactions on Information Forensics and Security最新文献

英文 中文
APEG: Adaptive Physical Layer Authentication with Channel Extrapolation and Generative AI APEG:自适应物理层认证与通道外推和生成人工智能
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-15 DOI: 10.1109/tifs.2026.3654380
Xiqi Cheng, Rui Meng, Xiaodong Xu, Haixiao Gao, Ping Zhang, Dusit Niyato
{"title":"APEG: Adaptive Physical Layer Authentication with Channel Extrapolation and Generative AI","authors":"Xiqi Cheng, Rui Meng, Xiaodong Xu, Haixiao Gao, Ping Zhang, Dusit Niyato","doi":"10.1109/tifs.2026.3654380","DOIUrl":"https://doi.org/10.1109/tifs.2026.3654380","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145972195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decision Boundary-aware Counterfactual Learning against Model Extraction Attacks on Graph Neural Networks 图神经网络模型抽取攻击的决策边界感知反事实学习
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-15 DOI: 10.1109/tifs.2026.3654865
Xiuwen Liu, Yanjiao Chen, Shanchen Pang
{"title":"Decision Boundary-aware Counterfactual Learning against Model Extraction Attacks on Graph Neural Networks","authors":"Xiuwen Liu, Yanjiao Chen, Shanchen Pang","doi":"10.1109/tifs.2026.3654865","DOIUrl":"https://doi.org/10.1109/tifs.2026.3654865","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"39 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145972196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bridging Lab and Industry: Practical SPA-GPT on Cryptosystems Boosted by LSTM and Simulated Annealing 连接实验室和工业:LSTM和模拟退火促进的密码系统的实用SPA-GPT
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-15 DOI: 10.1109/tifs.2026.3654798
Ziyu Wang, Yaoling Ding, An Wang, Congming Wei, Jingqi Zhang, Liehuang Zhu
{"title":"Bridging Lab and Industry: Practical SPA-GPT on Cryptosystems Boosted by LSTM and Simulated Annealing","authors":"Ziyu Wang, Yaoling Ding, An Wang, Congming Wei, Jingqi Zhang, Liehuang Zhu","doi":"10.1109/tifs.2026.3654798","DOIUrl":"https://doi.org/10.1109/tifs.2026.3654798","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"177 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145972197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling the Performance-Security Trade-off of Gasper’s Block Proposal Mechanism Under Latency-Driven Attacks 延迟驱动攻击下Gasper块提议机制的性能安全权衡建模
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-14 DOI: 10.1109/tifs.2026.3651978
Shuhan Qi, Qinglin Zhao, Zijie Liu, MengChu Zhou, Meng Shen, Peiyun Zhang, Yi Sun
{"title":"Modeling the Performance-Security Trade-off of Gasper’s Block Proposal Mechanism Under Latency-Driven Attacks","authors":"Shuhan Qi, Qinglin Zhao, Zijie Liu, MengChu Zhou, Meng Shen, Peiyun Zhang, Yi Sun","doi":"10.1109/tifs.2026.3651978","DOIUrl":"https://doi.org/10.1109/tifs.2026.3651978","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"60 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145972217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ProSan: Utility-based Prompt Privacy Sanitizer ProSan:基于实用程序的提示隐私消毒程序
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-14 DOI: 10.1109/tifs.2026.3654397
Zhili Shen, Zihang Xi, Ying He, Wei Tong, Jingyu Hua, Sheng Zhong
{"title":"ProSan: Utility-based Prompt Privacy Sanitizer","authors":"Zhili Shen, Zihang Xi, Ying He, Wei Tong, Jingyu Hua, Sheng Zhong","doi":"10.1109/tifs.2026.3654397","DOIUrl":"https://doi.org/10.1109/tifs.2026.3654397","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"30 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145972218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RIS-Assisted Integrated Communication and Secret Key Generation in Quasi-Static Environments 准静态环境下ris辅助集成通信与密钥生成
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-14 DOI: 10.1109/tifs.2026.3654398
Zheyuan Deng, Xiaoyan Hu, Keming Ma, Liang Jin, Boming Li, Jinghua Qu
{"title":"RIS-Assisted Integrated Communication and Secret Key Generation in Quasi-Static Environments","authors":"Zheyuan Deng, Xiaoyan Hu, Keming Ma, Liang Jin, Boming Li, Jinghua Qu","doi":"10.1109/tifs.2026.3654398","DOIUrl":"https://doi.org/10.1109/tifs.2026.3654398","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"267 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145972226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DySec: A Machine Learning-based Dynamic Analysis for Detecting Malicious Packages in PyPI Ecosystem DySec:基于机器学习的PyPI生态系统恶意包检测动态分析
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-14 DOI: 10.1109/tifs.2026.3654388
Sk Tanzir Mehedi, Chadni Islam, Gowri Ramachandran, Raja Jurdak
{"title":"DySec: A Machine Learning-based Dynamic Analysis for Detecting Malicious Packages in PyPI Ecosystem","authors":"Sk Tanzir Mehedi, Chadni Islam, Gowri Ramachandran, Raja Jurdak","doi":"10.1109/tifs.2026.3654388","DOIUrl":"https://doi.org/10.1109/tifs.2026.3654388","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"5 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145972220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Portability of Profiling Side-Channel Analysis: A Case Study Using Adjustable Implementations of Block Ciphers 侧信道分析的可移植性:使用分组密码的可调实现的案例研究
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-12 DOI: 10.1109/TIFS.2026.3651997
Di Li;Chun Li;Yufeng Tang;Yupeng Zhang;Zheng Gong
Inconsistencies in manufacturing features, sampling settings, and cryptographic implementations amongst the profiling and target devices can lead to the failure of profiling side-channel analysis (SCA). Various techniques, such as preprocessing, multi-device training, and transfer learning, have been proposed to mitigate this portability problem in profiling SCA. However, many techniques of block ciphers, such as tweaks, key-dependent components, and customized elements, might have uncertain effects from the perspective of cryptographic implementations, requiring further insightful analysis on their impact on portability. This paper investigates the portability of profiling SCA from a case study using adjustable implementations of block ciphers. First, we theoretically analyze the variation in leakage distribution under adjustable implementations. To support our theoretical results, a dataset of deep-learning SCA is built from AES, Pilsung, and Skinny. Specifically, we reveal how to reverse the parameterized components and recover the key from these adjustable implementations. According to our experiment on an 8-bit AVR microcontroller, the computational complexities of the attacks based on our model are less than $9times 2^{16}$ within 4500 traces. Moreover, the effectiveness of our proposed method is demonstrated under the combinatorial effect with adjustable implementations and device characteristics. Our case study provides insights into the results of adjustable implementations of block ciphers, which strengthens both the theoretical and practical understanding of the portability of profiling SCA.
在分析和目标设备之间的制造特性、采样设置和加密实现中的不一致可能导致分析侧信道分析(SCA)的失败。已经提出了各种技术,如预处理、多设备训练和迁移学习,以缓解SCA分析中的这种可移植性问题。然而,从加密实现的角度来看,许多块密码技术(如微调、依赖密钥的组件和定制元素)可能具有不确定的影响,因此需要对其对可移植性的影响进行进一步深入的分析。本文通过一个使用分组密码的可调实现的案例研究来研究分析SCA的可移植性。首先,我们从理论上分析了可调实现下泄漏分布的变化。为了支持我们的理论结果,我们使用AES、Pilsung和Skinny构建了一个深度学习SCA数据集。具体来说,我们揭示了如何反转参数化组件并从这些可调实现中恢复密钥。根据我们在8位AVR微控制器上的实验,基于我们模型的攻击的计算复杂性在4500次跟踪内小于$9乘以2^{16}$。此外,在具有可调实现和器件特性的组合效应下,验证了所提方法的有效性。我们的案例研究提供了对分组密码的可调实现结果的深入了解,从而加强了对分析SCA的可移植性的理论和实践理解。
{"title":"Portability of Profiling Side-Channel Analysis: A Case Study Using Adjustable Implementations of Block Ciphers","authors":"Di Li;Chun Li;Yufeng Tang;Yupeng Zhang;Zheng Gong","doi":"10.1109/TIFS.2026.3651997","DOIUrl":"https://doi.org/10.1109/TIFS.2026.3651997","url":null,"abstract":"Inconsistencies in manufacturing features, sampling settings, and cryptographic implementations amongst the profiling and target devices can lead to the failure of profiling side-channel analysis (SCA). Various techniques, such as preprocessing, multi-device training, and transfer learning, have been proposed to mitigate this portability problem in profiling SCA. However, many techniques of block ciphers, such as tweaks, key-dependent components, and customized elements, might have uncertain effects from the perspective of cryptographic implementations, requiring further insightful analysis on their impact on portability. This paper investigates the portability of profiling SCA from a case study using adjustable implementations of block ciphers. First, we theoretically analyze the variation in leakage distribution under adjustable implementations. To support our theoretical results, a dataset of deep-learning SCA is built from AES, Pilsung, and Skinny. Specifically, we reveal how to reverse the parameterized components and recover the key from these adjustable implementations. According to our experiment on an 8-bit AVR microcontroller, the computational complexities of the attacks based on our model are less than <inline-formula> <tex-math>$9times 2^{16}$ </tex-math></inline-formula> within 4500 traces. Moreover, the effectiveness of our proposed method is demonstrated under the combinatorial effect with adjustable implementations and device characteristics. Our case study provides insights into the results of adjustable implementations of block ciphers, which strengthens both the theoretical and practical understanding of the portability of profiling SCA.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"1021-1035"},"PeriodicalIF":8.0,"publicationDate":"2026-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145982335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributionally Robust Game for Proof-of-Work Blockchain Mining Under Resource Uncertainties 资源不确定性下工作量证明区块链挖矿的分布鲁棒博弈
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-12 DOI: 10.1109/TIFS.2026.3653580
Xunqiang Lan;Xiao Tang;Ruonan Zhang;Bin Li;Qinghe Du;Dusit Niyato;Zhu Han
Blockchain plays a crucial role in ensuring the security and integrity of decentralized systems, with the proof-of-work (PoW) mechanism being fundamental for achieving distributed consensus. As PoW blockchains see broader adoption, an increasingly diverse set of miners with varying computing capabilities participate in the network. In this paper, we consider the PoW blockchain mining, where the miners are associated with resource uncertainties. To characterize the uncertainty computing resources at different mining participants, we establish an ambiguous set representing uncertainty of resource distributions. Then, the networked mining is formulated as a non-cooperative game, where distributionally robust performance is calculated for each individual miner to tackle the resource uncertainties. We prove the existence of the equilibrium of the distributionally robust mining game. To derive the equilibrium, we propose the conditional value-at-risk (CVaR)-based reinterpretation of the best response of each miner. We then solve the individual strategy with alternating optimization, which facilitates the iteration among miners towards the game equilibrium. Furthermore, we consider the case that the ambiguity of resource distribution reduces to Gaussian distribution and the case that another uncertainties vanish, and then characterize the properties of the equilibrium therein along with a distributed algorithm to achieve the equilibrium. Simulation results show that the proposed approaches effectively converge to the equilibrium, and effectively tackle the uncertainties in blockchain mining to achieve a robust performance guarantee.
区块链在确保去中心化系统的安全性和完整性方面发挥着至关重要的作用,工作量证明(PoW)机制是实现分布式共识的基础。随着PoW区块链的广泛采用,越来越多具有不同计算能力的矿工参与到网络中。在本文中,我们考虑PoW区块链采矿,其中矿工与资源不确定性相关联。为了描述不同采矿参与者的不确定性计算资源,我们建立了一个表示资源分布不确定性的模糊集。然后,将网络采矿制定为非合作博弈,其中每个矿工计算分布式鲁棒性能以解决资源不确定性。证明了分布式鲁棒挖矿博弈均衡的存在性。为了导出均衡,我们提出了基于条件风险值(CVaR)的对每个矿工最佳响应的重新解释。然后,我们用交替优化的方法求解个体策略,这有利于矿工之间朝着博弈均衡的迭代。在此基础上,考虑了资源分布模糊性降为高斯分布和其他不确定性消失的情况,并对其中的均衡特性进行了刻画,提出了实现均衡的分布式算法。仿真结果表明,所提方法有效地收敛于平衡态,有效地解决了区块链开采中的不确定性,实现了鲁棒性性能保证。
{"title":"Distributionally Robust Game for Proof-of-Work Blockchain Mining Under Resource Uncertainties","authors":"Xunqiang Lan;Xiao Tang;Ruonan Zhang;Bin Li;Qinghe Du;Dusit Niyato;Zhu Han","doi":"10.1109/TIFS.2026.3653580","DOIUrl":"https://doi.org/10.1109/TIFS.2026.3653580","url":null,"abstract":"Blockchain plays a crucial role in ensuring the security and integrity of decentralized systems, with the proof-of-work (PoW) mechanism being fundamental for achieving distributed consensus. As PoW blockchains see broader adoption, an increasingly diverse set of miners with varying computing capabilities participate in the network. In this paper, we consider the PoW blockchain mining, where the miners are associated with resource uncertainties. To characterize the uncertainty computing resources at different mining participants, we establish an ambiguous set representing uncertainty of resource distributions. Then, the networked mining is formulated as a non-cooperative game, where distributionally robust performance is calculated for each individual miner to tackle the resource uncertainties. We prove the existence of the equilibrium of the distributionally robust mining game. To derive the equilibrium, we propose the conditional value-at-risk (CVaR)-based reinterpretation of the best response of each miner. We then solve the individual strategy with alternating optimization, which facilitates the iteration among miners towards the game equilibrium. Furthermore, we consider the case that the ambiguity of resource distribution reduces to Gaussian distribution and the case that another uncertainties vanish, and then characterize the properties of the equilibrium therein along with a distributed algorithm to achieve the equilibrium. Simulation results show that the proposed approaches effectively converge to the equilibrium, and effectively tackle the uncertainties in blockchain mining to achieve a robust performance guarantee.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"1036-1049"},"PeriodicalIF":8.0,"publicationDate":"2026-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145982203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MsgFilter: Proactive Anti-Harassment Sender-Anonymous Messaging System MsgFilter:主动反骚扰发送者匿名消息系统
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-02 DOI: 10.1109/TIFS.2025.3650417
Siqin Li;Kun He;Min Shi;Yajing Huang;Ruiying Du;Jing Chen
Anonymous submissions inspire people to speak up since hiding their identities can protect them from negative influence by their own words. However, the abuse of anonymity may bring harassment to those public submission callers. Existing works only handle DoS attacks or block harassment senders in an active manner, which behave poorly in the early prevention of uncharacterized harassment. In this paper, we propose MsgFliter, a sender-anonymous messaging system with proactive anti-harassment mechanism. Our core idea is to prevent unanswered senders from sending messages continually while keeping their identities, messages, and sender types secret. To meet the functionality and security requirements of MsgFliter, we propose the Anti-Harassment Anonymous Authentication (AHAA) protocol. We associate messages from the same sender through linkable tags and invalidate linkability when a message is replied to. To achieve session indistinguishability, we further combine the proposed anonymous authentication with zero-knowledge proofs of disjunctive relations. We implement MsgFliter and compare its performance with related solutions. Experimental results show that our solution is practicable.
匿名投稿激励人们发声,因为隐藏自己的身份可以保护他们免受自己言论的负面影响。然而,滥用匿名可能会给那些公开提交的呼叫者带来骚扰。现有的工作只处理DoS攻击或以积极的方式阻止骚扰发送者,这在早期预防非特征骚扰方面表现不佳。在本文中,我们提出了MsgFliter,一个具有主动反骚扰机制的发送者匿名消息系统。我们的核心思想是防止未回复的发送者持续发送消息,同时对其身份、消息和发送者类型保密。为了满足MsgFliter的功能和安全要求,我们提出了反骚扰匿名认证(AHAA)协议。我们通过可链接标签将来自同一发送者的消息关联起来,并在回复消息时使可链接性无效。为了实现会话不可区分性,我们进一步将提出的匿名认证与析取关系的零知识证明结合起来。我们实现了MsgFliter,并将其性能与相关解决方案进行了比较。实验结果表明,该方法是可行的。
{"title":"MsgFilter: Proactive Anti-Harassment Sender-Anonymous Messaging System","authors":"Siqin Li;Kun He;Min Shi;Yajing Huang;Ruiying Du;Jing Chen","doi":"10.1109/TIFS.2025.3650417","DOIUrl":"10.1109/TIFS.2025.3650417","url":null,"abstract":"Anonymous submissions inspire people to speak up since hiding their identities can protect them from negative influence by their own words. However, the abuse of anonymity may bring harassment to those public submission callers. Existing works only handle DoS attacks or block harassment senders in an active manner, which behave poorly in the early prevention of uncharacterized harassment. In this paper, we propose MsgFliter, a sender-anonymous messaging system with proactive anti-harassment mechanism. Our core idea is to prevent unanswered senders from sending messages continually while keeping their identities, messages, and sender types secret. To meet the functionality and security requirements of MsgFliter, we propose the Anti-Harassment Anonymous Authentication (AHAA) protocol. We associate messages from the same sender through linkable tags and invalidate linkability when a message is replied to. To achieve session indistinguishability, we further combine the proposed anonymous authentication with zero-knowledge proofs of disjunctive relations. We implement MsgFliter and compare its performance with related solutions. Experimental results show that our solution is practicable.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"741-756"},"PeriodicalIF":8.0,"publicationDate":"2026-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145893717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Forensics and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1