logo

SCIENTIA SINICA Informationis, Volume 46 , Issue 8 : 939-968(2016) https://doi.org/10.1360/N112016-00090

Architecture and key technologies of cyberspace security

More info
  • ReceivedApr 9, 2016
  • AcceptedJun 17, 2016

Abstract


Funded by

国家自然科学基金(61320106007)

国家自然科学基金(61272054)

国家自然科学基金(61572130)

国家自然科学基金(61502100)

国家自然科学基金(61402104)

国家自然科学基金(61532013)


References

[1] Fang B X. A hierarchy model on the research fields of cyberspace security technology. Chinese J Netw Inf Secur, 2016, 1: 2-7 [方滨兴. 从层次角度看网络空间安全技术的覆盖领域. 网络与信息安全学报, 2016, 1: 2-7]. Google Scholar

[2] Li H, Zhang N. Suggestions on cyber security talents cultivation. Chinese J Netw Inf Secur, 2016, 1: 18-23 [李晖, 张宁. 网络空间安全学科人才培养之思考. 网络与信息安全学报, 2016, 1: 18-23]. Google Scholar

[3] Li J H, Qiu W D, Meng K, et al. Discipline construction and talents training of cyberspace security. J Inf Secur Res, 2015, 1: 149-154 [李建华, 邱卫东, 孟魁, 等. 网络空间安全一级学科内涵建设和人才培养思考. 信息安全研究, 2015, 1: 149-154]. Google Scholar

[4] Danev B, Zanetti D, Capkun S. On physical-layer identification of wireless devices. ACM Comput Surv, 2012, 45: 1-29. Google Scholar

[5] Tekbas Ö H, Serinken N, Üreten O. An experimental performance evaluation of a novel radio-transmitter identification system under diverse environmental conditions. Canadian J Electr Comput Eng, 2004, 29: 203-209 CrossRef Google Scholar

[6] Rasmussen K B, Capkun S. Implications of radio fingerprinting on the security of sensor networks. In: Proceedings of the 3rd International Conference on Security and Privacy in Communications Networks and the Workshops, Nice, 2007. 331-340. Google Scholar

[7] Reising D R, Temple M A, Mendenhall M J. Improved wireless security for GMSK-based devices using RF fingerprinting. Int J Electron Secur Digit Foren, 2010, 3: 41-59 CrossRef Google Scholar

[8] Brik V, Banerjee S, Gruteser M, et al. Wireless device identification with radiometric signatures. In: Proceedings of the 14th ACM international conference on Mobile computing and networking, San Francisco, 2008. 116-127. Google Scholar

[9] Gerdes R M, Daniels T E, Mina M, et al. Device identification via analog signal fingerprinting: a matched filter approach. In: Proceedings of the Network and Distributed System Security Symposium, San Diego, 2006. 1-11. Google Scholar

[10] Gerdes R M, Mina M, Russell S F, et al. Physical-layer identification of wired Ethernet devices. IEEE Trans Inf Foren Secur, 2012, 7: 1339-1353 CrossRef Google Scholar

[11] Danev B, Heydt-Benjamin T S, Capkun S. Physical-layer identification of RFID devices. In: Proceedings of the 18th Conference on USENIX Security Symposium, Montreal, 2009. 199-214. Google Scholar

[12] Dey S, Roy N, Xu W, et al. AccelPrint: imperfections of accelerometers make smartphones trackable. In: Proceedings of the Network and Distributed System Security Symposium, San Diego, 2014. 1-16. Google Scholar

[13] Das A, Borisov N, Caesar M. Do you hear what I hear? fingerprinting smart devices through embedded acoustic components. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Arizona, 2014. 441-452. Google Scholar

[14] Zhou Z, Diao W, Liu X, et al. Acoustic fingerprinting revisited: Generate stable device id stealthily with inaudible sound. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Arizona, 2014. 429-440. Google Scholar

[15] Maurer U M. Secret key agreement by public discussion from common information. IEEE Trans Inf Theory, 1993, 39: 733-742 CrossRef Google Scholar

[16] Mathur S, Trappe W, Mandayam N, et al. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, San Francisco, 2008. 128-139. Google Scholar

[17] Jana S, Premnath S N, Clark M, et al. On the effectiveness of secret key extraction from wireless signal strength in real environments. In: Proceedings of the 15th ACM international Conference on Mobile Computing and Networking, Beijing, 2009. 321-332. Google Scholar

[18] Patwari N, Croft J, Jana S, et al. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Trans Mobile Comput, 2010, 9: 17-30 CrossRef Google Scholar

[19] Liu H, Yang J, Wang Y, et al. Collaborative secret key extraction leveraging received signal strength in mobile wireless networks. In: Proceedings of the 31st IEEE International Conference on Computer Communications, Orlando, 2012. 927-935. Google Scholar

[20] Yasukawa S, Iwai H, Sasaoka H. Adaptive key generation in secret key agreement scheme based on the channel characteristics in OFDM. In: Proceedings of International Symposium on Information Theory and its Applications, Auckland, 2008. 1-6. Google Scholar

[21] Sayeed A, Perrig A. Secure wireless communications: secret keys through multipath. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, 2008. 3013-3016. Google Scholar

[22] Wang Q, Su H, Ren K, et al. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In: Proceedings of the 30th IEEE International Conference on Computer Communications, Shanghai, 2011. 1422-1430. Google Scholar

[23] Liu Y, Draper S C, Sayeed A M. Exploiting channel diversity in secret key generation from multipath fading randomness. IEEE Trans Inf Foren Secur, 2012, 7: 1484-1497 CrossRef Google Scholar

[24] Chou T H, Draper S C, Sayeed A M. Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness. In: Proceedings of IEEE International Symposium on Information Theory, Austin, 2010. 2518--2522. Google Scholar

[25] Studnia I, Alata E, Deswarte Y, et al. Survey of security problems in cloud computing virtual machines. In: Proceedings of Computer and Electronics Security Applications Rendez-vous, Rennes, 2012. 61-74. Google Scholar

[26] Ferrie P. Attacks on more virtual machine emulators. Symantec Advanced Threat Res, 2007. 1-17. Google Scholar

[27] Ristenpart T, Tromer E, Shacham H, et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on Computer and communications security, Chicago, 2009. 199-212. Google Scholar

[28] King S T, Chen P M. SubVirt: implementing malware with virtual machines. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, 2006. 1-14. Google Scholar

[29] Nance K, Bishop M, Hay B. Virtual machine introspection: observation or interference? IEEE Secur Priv, 2008, 5: 32-37. Google Scholar

[30] Payne B D, Carbone M, Sharif M, et al. Lares: an architecture for secure active monitoring using virtualization. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, 2008. 233-247. Google Scholar

[31] Ibrahim A S, Hamlyn-Harris J, Grundy J, et al. CloudSec: a security monitoring appliance for Virtual Machines in the IaaS cloud model. In: Proceedings of the 5th International Conference on Network and System Security, Milan, 2011. 113-120. Google Scholar

[32] Yao F, Sprabery R, Campbell R H. CryptVMI: a flexible and encrypted virtual machine introspection system in the cloud. In: Proceedings of the 2nd international workshop on Security in cloud computing, Kyoto, 2014. 11-18. Google Scholar

[33] Seshadri A, Luk M, Qu N, et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In: Proceedings of the 21st ACM SIGOPS symposium on Operating systems principles, Washington, 2007. 335-350. Google Scholar

[34] Litty L, Lagar-Cavilla H A, Lie D. Hypervisor support for identifying covertly executing binaries. In: Proceedings of the 17th Conference on Security Symposium, Berkeley, 2008. 243-258. Google Scholar

[35] Wang Y D, Yang J H, Xu C, et al. Survey on access control technologies for cloud computing. J Soft, 2015, 26: 1129-1150 [王于丁, 杨家海, 徐聪, 等. 云计算访问控制技术研究综述. 软件学报, 2015, 26: 1129-1150]. Google Scholar

[36] Li X Y, Shi Y, Guo Y, et al. Multi-tenancy based access control in cloud. In: Proceedings of International Conference on Computational Intelligence and Software Engineering, Wuhan, 2010. 1-4. Google Scholar

[37] Tang B, Sandhu R, Li Q. Multi-tenancy authorization models for collaborative cloud services. Concurr Comput Pract Exper, 2015, 27: 2851-2868 CrossRef Google Scholar

[38] Kurmus A, Gupta M, Pletka R, et al. A comparison of secure multi-tenancy architectures for filesystem storage clouds. In: Proceedings of the 12th International Middleware Conference, Laxenburg, 2011. 460-479. Google Scholar

[39] Popa L, Yu M, Ko S Y, et al. CloudPolice: taking access control out of the network. In: Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, Monterey, 2010, 7. 1-6. Google Scholar

[40] Azab A M, Ning P, Wang Z, et al. HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, Chicago, 2010. 38-49. Google Scholar

[41] Wang Z, Jiang X. Hypersafe: a lightweight approach to provide lifetime hypervisor control-flow integrity. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, 2010. 380-395. Google Scholar

[42] Zhang F, Chen J, Chen H, et al. CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In: Proceedings of the 23rd ACM Symposium on Operating Systems Principles, Cascais, 2011. 203-216. Google Scholar

[43] Heiser G, Uhlig V, LeVasseur J. Are virtual-machine monitors microkernels done right? ACM SIGOPS Operating Syst Rev, 2006, 40: 95-99. Google Scholar

[44] Klein G, Elphinstone K, Heiser G, et al. seL4: formal verification of an OS kernel. In: Proceedings of the 22nd ACM SIGOPS Symposium on Operating Systems Principles, Big Sky, 2009. 207-220. Google Scholar

[45] Azab A M, Swidowski K, Bhutkar J M, et al. SKEE: a lightweight secure kernel-level execution environment for ARM. In: Proceedings of Network and Distributed System Security Symposium, San Diego, 2016. 1-15. Google Scholar

[46] Suh E, Ferraiuolo A, Wang Y, et al. Full-Processor Timing Channel Protection with Applications to Secure Hardware Compartments. Computing and Information Science Technical Reports, 2015. 1-15. Google Scholar

[47] Xia Y, Liu Y, Guan H, et al. Secure outsourcing of virtual appliance. IEEE Trans Cloud Comput, 2015, 99: 1-15. Google Scholar

[48] Ling Z, Luo J, Chen Q, et al. Secure fingertip mouse for mobile devices. In: Proceedings of the 35th Annual IEEE International Conference on Computer Communications, San Francisco, 2016. 1-9. Google Scholar

[49] Aviv A J, Gibson K, Mossop E, et al. Smudge attacks on smartphone touch screens. In: Proceedings of the 4th USENIX Workshop on Offensive Technologies, Washington, 2010. 1-10. Google Scholar

[50] Gao H, Ren Z, Chang X, et al. A new graphical password scheme resistant to shoulder-surfing. In: Proceedings of the International Conference on Cyberworlds, Singapore, 2010. 194-199. Google Scholar

[51] Kwon T, Na S. TinyLock: affordable defense against smudge attacks on smartphone pattern lock systems. Comput Secur, 2014, 42: 137-150 CrossRef Google Scholar

[52] Bojinov H, Boneh D. Mobile token-based authentication on a budget. In: Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, Phoenix, 2011. 14-19. Google Scholar

[53] Chen S, Pande A, Mohapatra P. Sensor-assisted facial recognition: an enhanced biometric authentication system for smartphones. In: Proceedings of the 12th International Conference on Mobile Systems, Applications, and Services, Bretton Woods, 2014. 109-122. Google Scholar

[54] Cheng K Y, Kumar A. Contactless finger knuckle identification using smartphones. In: Proceedings of the International Conference of the Biometrics Special Interest Group, Darmstadt, 2012. 1-6. Google Scholar

[55] Shabrina N, Akbar S, Ruswono P. Palmprint authentication in smartphone using phase-only correlation method. In: Proceedings of the 5th International Conference on Advanced Computer Science and Information Systems, Bali, 2013. 397-402. Google Scholar

[56] Raja K B, Raghavendra R, Stokkenes M, et al. Smartphone authentication system using periocular biometrics. In: Proceedings of the International Conference of the Biometrics Special Interest Group, Darmstadt, 2014. 1-8. Google Scholar

[57] de Luca A, Hang A, Brudy F, et al. Touch me once and I know it's you! implicit authentication based on touch screen patterns. In: Proceedings of the 30th ACM Conference on Human Factors in Computing Systems, Austin, 2012. 987-996. Google Scholar

[58] Clarke N L, Furnell S M. Authenticating mobile phone users using keystroke analysis. Int J Inf Secur, 2007, 6: 1-14. Google Scholar

[59] Giuffrida C, Majdanik K, Conti M, et al. I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics. In: Detection of Intrusions and Malware, and Vulnerability Assessment. Berlin: Springer, 2014. 92-111. Google Scholar

[60] Burgbacher U, Hinrichs K. An implicit author verification system for text messages based on gesture typing biometrics. In: Proceedings of the 32nd ACM Conference on Human Factors in Computing Systems, Toronto, 2014. 2951-2954. Google Scholar

[61] Derawi M O, Nickel C, Bours P, et al. Unobtrusive user-authentication on mobile phones using biometric gait recognition. In: Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Darmstadt, 2010. 306-311. Google Scholar

[62] Feng T, Liu Z, Kwon K A, et al. Continuous mobile authentication using touchscreen gestures. In: Proceedings of the IEEE Conference on Technologies for Homeland Security, Waltham, 2012. 451-456. Google Scholar

[63] Frank M, Biedert R, Ma E D, et al. Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Foren Secur, 2013, 8: 136-148 CrossRef Google Scholar

[64] Shen C, Zhang Y, Cai Z, et al. Touch-interaction behavior for continuous user authentication on smartphones. In: Proceedings of the 8th International Conference on Biometrics, Phuket, 2015. 157-162. Google Scholar

[65] Jakobsson M, Shi E, Golle P, et al. Implicit authentication for mobile devices. In: Proceedings of the 4th USENIX Workshop on Hot Topics in Security, Montreal, 2009. 9-14. Google Scholar

[66] Conti M, Zachia-Zlatea I, Crispo B. Mind how you answer me! In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, 2011. 249-259. Google Scholar

[67] McLaughlin S, Podkuiko D, McDaniel P. Energy theft in the advanced metering infrastructure. Crit Inf Infrastructures Secur, 2009, 6027: 176-187. Google Scholar

[68] Varodayan D P, Gao G X. Redundant metering for integrity with information-theoretic confidentiality. In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, 2010. 345-349. Google Scholar

[69] Liu N, Chen J, Zhu L, et al. A key management scheme for secure communications of advanced metering infrastructure in smart grid. IEEE Trans Ind Electron, 2013, 60: 4746-4756 CrossRef Google Scholar

[70] Diao F, Zhang F, Cheng X. A privacy-preserving smart metering scheme using linkable anonymous credential. IEEE Trans Ind Electron, 2015, 6: 461-467. Google Scholar

[71] Li F, Luo B, Liu P. Secure information aggregation for smart grids using homomorphic encryption. In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, 2010. 327-332. Google Scholar

[72] Li H, Mao R, Lai L, et al. Compressed meter reading for delay-sensitive and secure load report in smart grid. In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, 2010. 114-119. Google Scholar

[73] Rial A, Danezis G. Privacy-preserving smart metering. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, Chicago, 2011. 49-60. Google Scholar

[74] Ruj S, Nayak A. A decentralized security framework for data aggregation and access control in smart grids. IEEE Trans Ind Electron, 2013, 4: 196-205. Google Scholar

[75] Rottondi C, Verticale G, Capone A. Privacy-preserving smart metering with multiple data consumers. Comput Netw, 2013, 57: 1699-1713 CrossRef Google Scholar

[76] Birman K, Jelasity M, Kleinberg R, et al. Building a secure and privacy-preserving smart grid. ACM Special Interest Group Operating Syst Rev, 2015, 49: 131-136 CrossRef Google Scholar

[77] Yuan Y, Li Z, Ren K. Modeling load redistribution attacks in power systems. IEEE Trans Smart Grid, 2011, 2: 382-390 CrossRef Google Scholar

[78] Liu Y, Ning P, Reiter M K. False data injection attacks against state estimation in electric power grids. ACM Trans Inf Syst Secur, 2011, 14: 1-33. Google Scholar

[79] Huang Y, Esmalifalak M, Nguyen H, et al. Bad data injection in smart grid: attack and defense mechanisms. IEEE Commun Mag, 2013, 51: 27-33. Google Scholar

[80] Yu Z H, Chin W L. Blind false data injection attack using pca approximation method in smart grid. IEEE Trans Smart Grid, 2015, 6: 1219-1226 CrossRef Google Scholar

[81] Bobba R B, Rogers K M, Wang Q, et al. Detecting false data injection attacks on dc state estimation. In: Proceedings of the 1st Workshop on Secure Control Systems, Stockholm, 2010. 1-9. Google Scholar

[82] Dán G, Sandberg H. Stealth attacks and protection schemes for state estimators in power systems. In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, 2010. 214-219. Google Scholar

[83] Liu L, Esmalifalak M, Ding Q, et al. Detecting false data injection attacks on power grid by sparse optimization. IEEE Trans Smart Grid, 2014, 5: 612-621 CrossRef Google Scholar

[84] Lu Z, Lu X, Wang W, et al. Review and evaluation of security threats on the communication networks in the smart grid. In: Proceedings of IEEE Military Communications Conference, San Jose, 2010. 1830-1835. Google Scholar

[85] Li H, Lai L, Qiu R C. Communication capacity requirement for reliable and secure state estimation in smart grid. In: Proceedings of the 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, 2010. 191-196. Google Scholar

[86] Khurana H, Bobba R, Yardley T, et al. Design principles for power grid cyber-infrastructure authentication protocols. In: Proceedings of the 43rd Hawaii International Conference on System Sciences, Hawaii, 2010. 1-10. Google Scholar

[87] Yang M, Luo J, Ling Z, et al. De-anonymizing and countermeasures in anonymous communication networks. IEEE Commun Mag, 2015, 53: 60-66. Google Scholar

[88] Edman M, Syverson P. AS-awareness in tor path selection. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, 2009. 380-389. Google Scholar

[89] Murdoch S J, Zieliński P. Sampled traffic analysis by internet-exchange-level adversaries. In: Proceedings of the Privacy Enhancing Technologies, Berlin, 2007. 167-183. Google Scholar

[90] Johnson A, Wacek C, Jansen R, et al. Users get routed: traffic correlation on tor by realistic adversaries. In: Proceedings of the 20th ACM Conference on Computer and Communications Security, Berlin, 2013. 337-348. Google Scholar

[91] Bauer K, McCoy D, Grunwald D, et al. Low-resource routing attacks against Tor. In: Proceedings of the ACM Workshop on Privacy in the Electronic Society, Alexandria, 2007. 11-20. Google Scholar

[92] Pappas V, Athanasopoulos E, Ioannidis S, et al. Compromising anonymity using packet spinning. In: Proceedings of the 11th Information Security Conference, Taipei, 2008. 161-174. Google Scholar

[93] Yu W, Fu X, Graham S, et al. DSSS-based flow marking technique for invisible traceback. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, 2007. 18-32. Google Scholar

[94] Houmansadr A, Kiyavash N, Borisov N. RAINBOW: a robust and invisible non-blind watermark for network flows. In: Proceedings of the 16th Annual Network {&} Distributed System Security Symposium, San Diego, 2009. 1-13. Google Scholar

[95] Wang X, Luo J, Yang M. An interval centroid based spread spectrum watermark for tracing multiple network flows. In: Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, San Antonio, 2009. 4000-4006. Google Scholar

[96] Ling Z, Luo J, Yu W, et al. A new cell counter based attack against tor. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, 2009. 578-589. Google Scholar

[97] Ling Z, Luo J, Yu W, et al. Protocol-level attacks against tor. Comput Netw, 2013, 57: 869-886 CrossRef Google Scholar

[98] Ling Z, Fu X, Jia W, et al. Novel packet size-based covert channel attacks against anonymizer. IEEE Trans Comput, 2013, 62: 2411-2426 CrossRef Google Scholar

[99] Wang X, Luo J, Yang M, et al. A potential HTTP-based application-level attack against tor. Future Gener Comput Syst, 2011, 27: 67-77 CrossRef Google Scholar

[100] Chakravarty S, Barbera M V, Portokalidis G, et al. On the effectiveness of traffic analysis against anonymity networks using flow records. In: Proceedings of Passive and Active Measurement Conference, Los Angeles, 2014. 247-257. Google Scholar

[101] Hintz A. Fingerprinting websites using traffic analysis. In: Proceedings of the 2nd International Conference on Privacy Enhancing Technologies, San Francisco, 2002. 171-178. Google Scholar

[102] Liberatore M, Levine B N. Inferring the source of encrypted HTTP connections. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, 2006. 255-263. Google Scholar

[103] Panchenko A, Niessen L, Zinnen A, et al. Website fingerprinting in onion routing based anonymization networks. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, New York, 2011. 103-114. Google Scholar

[104] Cai X, Zhang X C, Joshi B, et al. Touching from a distance: website fingerprinting attacks and defenses. In: Proceedings of the ACM Conference on Computer and Communications Security, New York, 2012. 605-616. Google Scholar

[105] Wang T, Cai X, Nithyanand R, et al. Effective attacks and provable defenses for website fingerprinting. In: Proceedings of the 23rd USENIX Security Symposium, San Diego, 2014. 143-157. Google Scholar

[106] He G, Yang M, Gu X, et al. A novel active website fingerprinting attack against tor anonymous system. In: Proceedings of the 18th IEEE International Conference on Computer Supported Cooperative Work in Design, Hsinchu, 2014. 112-117. Google Scholar

[107] Bennett C H, Brassard G. Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computer System and Signal Processing, New York, 1984. 175-179. Google Scholar

[108] Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances. Science, 1999, 283: 2050-2056 CrossRef Google Scholar

[109] Ekert A K. Quantum cryptography based on Bell's theorem. Phys Rev Lett, 1991, 67: 661-663 CrossRef Google Scholar

[110] Bennett C H. Quantum cryptography using any two nonorthogonal states. Phys Rev Lett, 1992, 68: 3121-3124 CrossRef Google Scholar

[111] Peng C Z, Yang T, Bao X H, et al. Experimental free-space distribution of entangled photon pairs over 13 km: towards satellite-based global quantum communication. Phys Rev Lett, 2005, 94: 1-4. Google Scholar

[112] Peng C Z, Zhang J, Yang D, et al. Experimental long-distance decoy-state quantum key distribution based on polarization encoding. Phys Rev Lett, 2007, 98: 1-4. Google Scholar

[113] Jin X M, Ren J G. Experimental free-space quantum teleportation. Nature Photon, 2010, 4: 376-381 CrossRef Google Scholar

[114] Hoffstein J, Pipher J, Silverman J H. NTRU: a ring-based public key cryptosystem. In: Proceedings of the 3rd International Symposium on Algorithmic Number Theory, Portland, 1998. 267-288. Google Scholar

[115] Regev O. On lattices, learning with errors, random linear codes, and cryptography. J ACM, 2009, 56: 34-73. Google Scholar

[116] Gentry C. Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st ACM Symposium on Theory of Computing, Bethesda, 2009. 169-178. Google Scholar

[117] Agrawal S, Boneh D, Boyen X. Efficient lattice (H) IBE in the standard model. In: Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Riviera, 2010. 553-572. Google Scholar

[118] Lyubashevsky V. Lattice signatures without trapdoors. In: Proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, 2012. 738-755. Google Scholar

[119] Adleman L M. Molecular computation of solutions to combinatorial problems. Science, 1994, 266: 1021-1024 CrossRef Google Scholar

[120] Tang J, Cui Y, Li Q, et al. Ensuring security and privacy preservation for cloud data services. ACM Comput Surv, 2016, 49: 1-39. Google Scholar

[121] Rivest R L, Adleman L, Dertouzos M L. On data banks and privacy homomorphisms. Found Secure Comput, 1978, 4: 169-180. Google Scholar

[122] van Dijk M, Gentry C, Halevi S, et al. Fully homomorphic encryption over the integers. In: Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Riviera, 2010. 24-43. Google Scholar

[123] Song D X, Wagner D, Perrig A. Practical techniques for searches on encrypted data. In: Proceedings of IEEE Symposium on Security and Privacy, Berkeley, 2000. 44-55. Google Scholar

[124] Boneh D, Di Crescenzo G, Ostrovsky R, et al. Public key encryption with keyword search. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, 2004. 506-522. Google Scholar

[125] Cao N, Wang C, Li M, et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Trans Parall Distrib Syst, 2014, 25: 222-233 CrossRef Google Scholar

[126] Sahai A, Waters B. Fuzzy identity-based encryption. In: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, 2005. 457-473. Google Scholar

[127] Lewko A, Okamoto T, Sahai A, et al. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Riviera, 2010. 62-91. Google Scholar

[128] O'Neill A. Definitional issues in functional encryption. IACR Cryptology ePrint Archive, 2010. 1-11. Google Scholar

[129] Boneh D, Sahai A, Waters B. Functional encryption: definitions and challenges. Theory Cryptogr, 2011, 6597: 253-273 CrossRef Google Scholar

[130] Naveed M, Agrawal S, Prabhakaran M, et al. Controlled functional encryption. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Arizona, 2014. 1280-1291. Google Scholar

[131] David M, Ranasinghe D C, Larsen T. A2U2: a stream cipher for printed electronics RFID tags. In: Proceedings of IEEE International Conference on RFID, Orlando, 2011. 176-183. Google Scholar

[132] Saarinen M J O. The BlueJay ultra-lightweight hybrid cryptosystem. In: Proceedings of IEEE Symposium on Security and Privacy Workshops, San Francisco, 2012. 27-32. Google Scholar

[133] Gong Z. Survey on lightweight hash functions. J Cryptologic Res, 2016, 3: 1-11 [龚征. 轻量级Hash函数研究. 密码学报, 2016, 3: 1-11]. Google Scholar

[134] Bogdanov A, Kne\v{z}evi$\acute{\rm c}$ M, Leander G, et al. SPONGENT: a lightweight hash function. In: Proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, Nara, 2011. 312-325. Google Scholar

[135] Yoshida H, Watanabe D, Okeya K, et al. MAME: a compression function with reduced hardware requirements. In: Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, 2007. 148-165. Google Scholar

[136] Hirose S, Ideguchi K, Kuwakado H, et al. A lightweight 256-bit hash function for hardware and low-end devices: lesamnta-LW. In: Proceedings of the 13th International Conference on Information Security and Cryptology, Seoul, 2010. 151-168. Google Scholar

[137] Kuwakado H, Hirose S. Hashing mode using a lightweight blockcipher. In: Proceedings of the 14th IMA International Conference on Cryptography and Coding, Oxford, 2013. 213-231. Google Scholar

[138] Billet O, Robshaw M J B, Peyrin T. On building hash functions from multivariate quadratic equations. In: Proceedings of the 12th Australasian Conference Information Security and Privacy, Townsville, 2007. 82-95. Google Scholar

[139] Bettale L, Faugere J C, Perret L. Security analysis of multivariate polynomials for hashing. In: Proceedings of the 11th International Conference Information Security and Cryptology, Seoul, 2008. 115-124. Google Scholar