首页 > 最新文献

IEEE Transactions on Information Forensics and Security最新文献

英文 中文
APEG: Adaptive Physical Layer Authentication with Channel Extrapolation and Generative AI APEG:自适应物理层认证与通道外推和生成人工智能
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-15 DOI: 10.1109/tifs.2026.3654380
Xiqi Cheng, Rui Meng, Xiaodong Xu, Haixiao Gao, Ping Zhang, Dusit Niyato
{"title":"APEG: Adaptive Physical Layer Authentication with Channel Extrapolation and Generative AI","authors":"Xiqi Cheng, Rui Meng, Xiaodong Xu, Haixiao Gao, Ping Zhang, Dusit Niyato","doi":"10.1109/tifs.2026.3654380","DOIUrl":"https://doi.org/10.1109/tifs.2026.3654380","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"19 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145972195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decision Boundary-aware Counterfactual Learning against Model Extraction Attacks on Graph Neural Networks 图神经网络模型抽取攻击的决策边界感知反事实学习
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-15 DOI: 10.1109/tifs.2026.3654865
Xiuwen Liu, Yanjiao Chen, Shanchen Pang
{"title":"Decision Boundary-aware Counterfactual Learning against Model Extraction Attacks on Graph Neural Networks","authors":"Xiuwen Liu, Yanjiao Chen, Shanchen Pang","doi":"10.1109/tifs.2026.3654865","DOIUrl":"https://doi.org/10.1109/tifs.2026.3654865","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"39 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145972196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bridging Lab and Industry: Practical SPA-GPT on Cryptosystems Boosted by LSTM and Simulated Annealing 连接实验室和工业:LSTM和模拟退火促进的密码系统的实用SPA-GPT
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-15 DOI: 10.1109/tifs.2026.3654798
Ziyu Wang, Yaoling Ding, An Wang, Congming Wei, Jingqi Zhang, Liehuang Zhu
{"title":"Bridging Lab and Industry: Practical SPA-GPT on Cryptosystems Boosted by LSTM and Simulated Annealing","authors":"Ziyu Wang, Yaoling Ding, An Wang, Congming Wei, Jingqi Zhang, Liehuang Zhu","doi":"10.1109/tifs.2026.3654798","DOIUrl":"https://doi.org/10.1109/tifs.2026.3654798","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"177 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145972197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling the Performance-Security Trade-off of Gasper’s Block Proposal Mechanism Under Latency-Driven Attacks 延迟驱动攻击下Gasper块提议机制的性能安全权衡建模
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-14 DOI: 10.1109/tifs.2026.3651978
Shuhan Qi, Qinglin Zhao, Zijie Liu, MengChu Zhou, Meng Shen, Peiyun Zhang, Yi Sun
{"title":"Modeling the Performance-Security Trade-off of Gasper’s Block Proposal Mechanism Under Latency-Driven Attacks","authors":"Shuhan Qi, Qinglin Zhao, Zijie Liu, MengChu Zhou, Meng Shen, Peiyun Zhang, Yi Sun","doi":"10.1109/tifs.2026.3651978","DOIUrl":"https://doi.org/10.1109/tifs.2026.3651978","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"60 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145972217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ProSan: Utility-based Prompt Privacy Sanitizer ProSan:基于实用程序的提示隐私消毒程序
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-14 DOI: 10.1109/tifs.2026.3654397
Zhili Shen, Zihang Xi, Ying He, Wei Tong, Jingyu Hua, Sheng Zhong
{"title":"ProSan: Utility-based Prompt Privacy Sanitizer","authors":"Zhili Shen, Zihang Xi, Ying He, Wei Tong, Jingyu Hua, Sheng Zhong","doi":"10.1109/tifs.2026.3654397","DOIUrl":"https://doi.org/10.1109/tifs.2026.3654397","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"30 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145972218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RIS-Assisted Integrated Communication and Secret Key Generation in Quasi-Static Environments 准静态环境下ris辅助集成通信与密钥生成
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-14 DOI: 10.1109/tifs.2026.3654398
Zheyuan Deng, Xiaoyan Hu, Keming Ma, Liang Jin, Boming Li, Jinghua Qu
{"title":"RIS-Assisted Integrated Communication and Secret Key Generation in Quasi-Static Environments","authors":"Zheyuan Deng, Xiaoyan Hu, Keming Ma, Liang Jin, Boming Li, Jinghua Qu","doi":"10.1109/tifs.2026.3654398","DOIUrl":"https://doi.org/10.1109/tifs.2026.3654398","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"267 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145972226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DySec: A Machine Learning-based Dynamic Analysis for Detecting Malicious Packages in PyPI Ecosystem DySec:基于机器学习的PyPI生态系统恶意包检测动态分析
IF 6.8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-14 DOI: 10.1109/tifs.2026.3654388
Sk Tanzir Mehedi, Chadni Islam, Gowri Ramachandran, Raja Jurdak
{"title":"DySec: A Machine Learning-based Dynamic Analysis for Detecting Malicious Packages in PyPI Ecosystem","authors":"Sk Tanzir Mehedi, Chadni Islam, Gowri Ramachandran, Raja Jurdak","doi":"10.1109/tifs.2026.3654388","DOIUrl":"https://doi.org/10.1109/tifs.2026.3654388","url":null,"abstract":"","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"5 1","pages":""},"PeriodicalIF":6.8,"publicationDate":"2026-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145972220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Casper: A Causality-Inspired Defense With Confounder Against Label Inference Attacks in Vertical Split Federated Learning Casper:在垂直分裂联邦学习中,一种带有混杂物的因果关系启发防御标签推理攻击
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-12 DOI: 10.1109/TIFS.2026.3652013
Meng Shen;Jin Meng;Bohan Peng;Xiangyun Tang;Wei Wang;Dusit Niyato;Liehuang Zhu
Vertical Split Federated Learning (VSFL) allows participants to collaboratively train a better model with different features vertically partitioned in the same sample space, where the model is divided into bottom model and top model by the cut layer, trained by passive and active participants respectively. However, in the process, the labels owned by the active participant will still be inferred or stolen by curious or malicious passive participants. In this paper, we propose Casper, a causality-inspired defense mechanism with a confounder against label inference attacks in VSFL. Casper first analyzes the feasibility of optimizing the training process in VSFL at the intervention level from a causal perspective. It then introduces a confounder consisting of cut layer output reconstruction and label obfuscation to disrupt the direct causality between cut layer outputs and labels. Additionally, we integrate selective discrepancy training to further ensure model utility by strategically balancing training between active and passive participants. Extensive experiments conducted on four datasets across different tasks demonstrate that Casper effectively preserves label privacy while maintaining model performance, significantly outperforming current advanced defending methods in VSFL.
垂直分割联邦学习(Vertical Split Federated Learning, VSFL)允许参与者在同一样本空间中协同训练不同特征垂直分割的更好的模型,其中模型被切割层分为底部模型和顶部模型,分别由被动参与者和主动参与者训练。然而,在这个过程中,主动参与者所拥有的标签仍然会被好奇或恶意的被动参与者推断或窃取。在本文中,我们提出了Casper,这是一种基于因果关系的防御机制,具有针对VSFL中标签推理攻击的混淆。Casper首先从因果关系的角度分析了在干预层面优化VSFL训练过程的可行性。然后,它引入了一个由切割层输出重建和标签混淆组成的混杂器,以破坏切割层输出和标签之间的直接因果关系。此外,我们整合了选择性差异训练,通过战略性地平衡主动和被动参与者之间的训练,进一步确保模型的实用性。在不同任务的四个数据集上进行的大量实验表明,Casper在保持模型性能的同时有效地保护了标签隐私,显著优于当前VSFL中的高级防御方法。
{"title":"Casper: A Causality-Inspired Defense With Confounder Against Label Inference Attacks in Vertical Split Federated Learning","authors":"Meng Shen;Jin Meng;Bohan Peng;Xiangyun Tang;Wei Wang;Dusit Niyato;Liehuang Zhu","doi":"10.1109/TIFS.2026.3652013","DOIUrl":"https://doi.org/10.1109/TIFS.2026.3652013","url":null,"abstract":"Vertical Split Federated Learning (VSFL) allows participants to collaboratively train a better model with different features vertically partitioned in the same sample space, where the model is divided into bottom model and top model by the cut layer, trained by passive and active participants respectively. However, in the process, the labels owned by the active participant will still be inferred or stolen by curious or malicious passive participants. In this paper, we propose Casper, a causality-inspired defense mechanism with a confounder against label inference attacks in VSFL. Casper first analyzes the feasibility of optimizing the training process in VSFL at the intervention level from a causal perspective. It then introduces a confounder consisting of cut layer output reconstruction and label obfuscation to disrupt the direct causality between cut layer outputs and labels. Additionally, we integrate selective discrepancy training to further ensure model utility by strategically balancing training between active and passive participants. Extensive experiments conducted on four datasets across different tasks demonstrate that Casper effectively preserves label privacy while maintaining model performance, significantly outperforming current advanced defending methods in VSFL.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"1050-1064"},"PeriodicalIF":8.0,"publicationDate":"2026-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Portability of Profiling Side-Channel Analysis: A Case Study Using Adjustable Implementations of Block Ciphers 侧信道分析的可移植性:使用分组密码的可调实现的案例研究
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-12 DOI: 10.1109/TIFS.2026.3651997
Di Li;Chun Li;Yufeng Tang;Yupeng Zhang;Zheng Gong
Inconsistencies in manufacturing features, sampling settings, and cryptographic implementations amongst the profiling and target devices can lead to the failure of profiling side-channel analysis (SCA). Various techniques, such as preprocessing, multi-device training, and transfer learning, have been proposed to mitigate this portability problem in profiling SCA. However, many techniques of block ciphers, such as tweaks, key-dependent components, and customized elements, might have uncertain effects from the perspective of cryptographic implementations, requiring further insightful analysis on their impact on portability. This paper investigates the portability of profiling SCA from a case study using adjustable implementations of block ciphers. First, we theoretically analyze the variation in leakage distribution under adjustable implementations. To support our theoretical results, a dataset of deep-learning SCA is built from AES, Pilsung, and Skinny. Specifically, we reveal how to reverse the parameterized components and recover the key from these adjustable implementations. According to our experiment on an 8-bit AVR microcontroller, the computational complexities of the attacks based on our model are less than $9times 2^{16}$ within 4500 traces. Moreover, the effectiveness of our proposed method is demonstrated under the combinatorial effect with adjustable implementations and device characteristics. Our case study provides insights into the results of adjustable implementations of block ciphers, which strengthens both the theoretical and practical understanding of the portability of profiling SCA.
在分析和目标设备之间的制造特性、采样设置和加密实现中的不一致可能导致分析侧信道分析(SCA)的失败。已经提出了各种技术,如预处理、多设备训练和迁移学习,以缓解SCA分析中的这种可移植性问题。然而,从加密实现的角度来看,许多块密码技术(如微调、依赖密钥的组件和定制元素)可能具有不确定的影响,因此需要对其对可移植性的影响进行进一步深入的分析。本文通过一个使用分组密码的可调实现的案例研究来研究分析SCA的可移植性。首先,我们从理论上分析了可调实现下泄漏分布的变化。为了支持我们的理论结果,我们使用AES、Pilsung和Skinny构建了一个深度学习SCA数据集。具体来说,我们揭示了如何反转参数化组件并从这些可调实现中恢复密钥。根据我们在8位AVR微控制器上的实验,基于我们模型的攻击的计算复杂性在4500次跟踪内小于$9乘以2^{16}$。此外,在具有可调实现和器件特性的组合效应下,验证了所提方法的有效性。我们的案例研究提供了对分组密码的可调实现结果的深入了解,从而加强了对分析SCA的可移植性的理论和实践理解。
{"title":"Portability of Profiling Side-Channel Analysis: A Case Study Using Adjustable Implementations of Block Ciphers","authors":"Di Li;Chun Li;Yufeng Tang;Yupeng Zhang;Zheng Gong","doi":"10.1109/TIFS.2026.3651997","DOIUrl":"https://doi.org/10.1109/TIFS.2026.3651997","url":null,"abstract":"Inconsistencies in manufacturing features, sampling settings, and cryptographic implementations amongst the profiling and target devices can lead to the failure of profiling side-channel analysis (SCA). Various techniques, such as preprocessing, multi-device training, and transfer learning, have been proposed to mitigate this portability problem in profiling SCA. However, many techniques of block ciphers, such as tweaks, key-dependent components, and customized elements, might have uncertain effects from the perspective of cryptographic implementations, requiring further insightful analysis on their impact on portability. This paper investigates the portability of profiling SCA from a case study using adjustable implementations of block ciphers. First, we theoretically analyze the variation in leakage distribution under adjustable implementations. To support our theoretical results, a dataset of deep-learning SCA is built from AES, Pilsung, and Skinny. Specifically, we reveal how to reverse the parameterized components and recover the key from these adjustable implementations. According to our experiment on an 8-bit AVR microcontroller, the computational complexities of the attacks based on our model are less than <inline-formula> <tex-math>$9times 2^{16}$ </tex-math></inline-formula> within 4500 traces. Moreover, the effectiveness of our proposed method is demonstrated under the combinatorial effect with adjustable implementations and device characteristics. Our case study provides insights into the results of adjustable implementations of block ciphers, which strengthens both the theoretical and practical understanding of the portability of profiling SCA.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"1021-1035"},"PeriodicalIF":8.0,"publicationDate":"2026-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145982335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lightweight Blockchain-Assisted Certificateless Cloud Data Integrity Auditing Scheme Without Third-Party Auditor 一种轻量级区块链辅助无证书云数据完整性审计方案,无需第三方审计员
IF 8 1区 计算机科学 Q1 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-12 DOI: 10.1109/TIFS.2026.3652010
Chen Zhu;Yang Lu;Nian Xia;Jiguo Li;Yinxia Sun
Data Integrity Auditing (DIA) enables users to remotely verify whether their data saved in third-party clouds has been maliciously tampered with or compromised. As an extension of DIA in certificateless cryptography, certificateless DIA (CL-DIA) integrates the merits of conventional public-key cryptography (no key escrow) and identity-based cryptography (no certificates). However, CL-DIA schemes depend on a reliable third-party auditor (TPA) to perform integrity audits, inevitably suffering from performance bottleneck and single-point failure problems. Moreover, almost all current CL-DIA schemes were designed with computationally expensive bilinear pairings. Cryptanalysis demonstrates that the existing unique pairing-free CL-DIA scheme fails to achieve the unforgeable security of auditing proofs. In this work, we put forward a lightweight blockchain-assisted CL-DIA scheme. The scheme achieves DIA through the blockchain instead of a single TPA, thereby overcoming the problems caused by the TPA-based centralized auditing model. Then, by avoiding time-consuming pairing operations and employing edge servers in generating verifiable tags for the uploaded data of users, its performance surpasses previous pairing-based CL-DIA schemes, particularly in terms of computation efficiency. Furthermore, we provide formal proofs in the random oracle model demonstrating that our scheme achieves unforgeability of verifiable tags and auditing proofs, ensures data privacy secrity, and is resistant to collusion attacks between the EN and the CSP. Finally, experimental results show that when auditing 25 file blocks, our scheme only costs 0.29s, which reduces the total time cost of integrity auditing phase by 48.2%-85.5% compared to current pairing-based CL-DIA schemes.
数据完整性审计(Data Integrity Auditing, DIA)使用户能够远程验证其保存在第三方云上的数据是否被恶意篡改或泄露。作为DIA在无证书密码学中的扩展,无证书DIA (CL-DIA)集成了传统公钥密码学(无密钥托管)和基于身份的密码学(无证书)的优点。但是,CL-DIA方案依赖可靠的第三方审计员(TPA)来执行完整性审计,因此不可避免地会遇到性能瓶颈和单点故障问题。此外,目前几乎所有的CL-DIA方案都设计了计算代价昂贵的双线性对。密码分析表明,现有的唯一无配对CL-DIA方案无法实现审计证明的不可伪造安全性。在这项工作中,我们提出了一种轻量级的区块链辅助CL-DIA方案。该方案通过区块链而不是单一的TPA来实现DIA,从而克服了基于TPA的集中式审计模型带来的问题。然后,通过避免耗时的配对操作,并使用边缘服务器为用户上传的数据生成可验证的标签,其性能优于以往基于配对的CL-DIA方案,特别是在计算效率方面。此外,我们在随机oracle模型中提供了形式化的证明,证明我们的方案实现了可验证标签和审计证明的不可伪造性,保证了数据隐私安全性,并且能够抵抗EN和CSP之间的共谋攻击。最后,实验结果表明,当审计25个文件块时,我们的方案仅花费0.29秒,与目前基于配对的CL-DIA方案相比,完整性审计阶段的总时间成本降低了48.2% ~ 85.5%。
{"title":"A Lightweight Blockchain-Assisted Certificateless Cloud Data Integrity Auditing Scheme Without Third-Party Auditor","authors":"Chen Zhu;Yang Lu;Nian Xia;Jiguo Li;Yinxia Sun","doi":"10.1109/TIFS.2026.3652010","DOIUrl":"https://doi.org/10.1109/TIFS.2026.3652010","url":null,"abstract":"Data Integrity Auditing (DIA) enables users to remotely verify whether their data saved in third-party clouds has been maliciously tampered with or compromised. As an extension of DIA in certificateless cryptography, certificateless DIA (CL-DIA) integrates the merits of conventional public-key cryptography (no key escrow) and identity-based cryptography (no certificates). However, CL-DIA schemes depend on a reliable third-party auditor (TPA) to perform integrity audits, inevitably suffering from performance bottleneck and single-point failure problems. Moreover, almost all current CL-DIA schemes were designed with computationally expensive bilinear pairings. Cryptanalysis demonstrates that the existing unique pairing-free CL-DIA scheme fails to achieve the unforgeable security of auditing proofs. In this work, we put forward a lightweight blockchain-assisted CL-DIA scheme. The scheme achieves DIA through the blockchain instead of a single TPA, thereby overcoming the problems caused by the TPA-based centralized auditing model. Then, by avoiding time-consuming pairing operations and employing edge servers in generating verifiable tags for the uploaded data of users, its performance surpasses previous pairing-based CL-DIA schemes, particularly in terms of computation efficiency. Furthermore, we provide formal proofs in the random oracle model demonstrating that our scheme achieves unforgeability of verifiable tags and auditing proofs, ensures data privacy secrity, and is resistant to collusion attacks between the EN and the CSP. Finally, experimental results show that when auditing 25 file blocks, our scheme only costs 0.29s, which reduces the total time cost of integrity auditing phase by 48.2%-85.5% compared to current pairing-based CL-DIA schemes.","PeriodicalId":13492,"journal":{"name":"IEEE Transactions on Information Forensics and Security","volume":"21 ","pages":"976-991"},"PeriodicalIF":8.0,"publicationDate":"2026-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146026561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Information Forensics and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1