Yu Zhan’s research while affiliated with Xidian University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (19)


Secure and Efficient Cloud-Based Multi-Party Private Set Intersection With Union Protocol
  • Article

January 2025

IEEE Transactions on Cloud Computing

Qian Liu

·

Yu Zhan

·

Secure Multi-party Computation (MPC) is a highly active research field, with Private Set Intersection (PSI) being a classic subtopic within it. However, simple intersection computation is insufficient for many real-world scenarios, leading to the development of various PSI variant protocols. In this context, we propose a cloud-based multi-party private set intersection with union protocol, denoted as MPSI-U. This protocol securely computes the intersection of the designated party's set with the union of the sets of all other parties, which can be applied to scenarios such as contact tracing. MPSI-U leverages cloud servers to alleviate the computational burden placed on users, while guaranteeing privacy and security simultaneously for all involved parties with the threshold BGN cryptographic system. Furthermore, a comprehensive formal security analysis of the protocol was conducted under the semi-honest model to prove its resilience against potential security threats. Based on our performance analysis, MPSI-U exhibits favorable characteristics in terms of communication and computation overhead. This enhances the versatility of MPSI-U, rendering it a valuable solution that can be widely applied across various domains and scenarios.



Estimate total time comparison for a voter of the three systems.
Estimate total time comparison for AC of 5 candidates.
Efficient Electronic Voting System Based on Homomorphic Encryption
  • Article
  • Full-text available

January 2024

·

185 Reads

·

6 Citations

Yu Zhan

·

Wei Zhao

·

Chaoxi Zhu

·

[...]

·

Baocang Wang

In the last decade, E-voting has received great attention due to its advantages in efficiency and accuracy. Fan et al. presented a novel E-voting system named HSE-Voting by utilizing homomorphic signcryption. The HSE-Voting system was claimed to gain a provable security goal under the standard proof. In this paper, we illustrate that their scheme may suffer from some potential security issues. On the one hand, the voting information could be recovered by the authentication center (AC). On the other hand, any malicious voter could disrupt the voting system undetected by locally modifying his ballot. In order to increase the resilience of the voting system to risks, an improvement of the HSE-Voting system is developed. Our improved system fixes the above security weaknesses but increases the computation cost on the AC side by a small amount. In addition, the proposed scheme satisfies voter anonymity, ballot privacy, and verifiability of election results.

Download

System model of size-hiding multi-party private set intersection protocol
Running time of other participants under different sets sizes
Running time of designated party under different sets sizes
Running time of SHI-MPSI under different N
Running time of SHI-MPSI under different number of participants
Hiding the input-size in multi-party private set intersection

May 2023

·

40 Reads

·

5 Citations

Designs Codes and Cryptography

Ateniese et al. (PKC 2011) introduced the concept of size-hiding private set intersection (SHI-PSI) and proposed a construction for two parties. The SHI-PSI protocol protects the privacy of input set content and better guarantees the privacy of the client set size. However, more practical protocols in multi-party scenarios have remained a research gap. In this paper, we propose a secure and feasible protocol named size-hiding multi-party private set intersection. Based on the Bloom filter, threshold homomorphic encryption and marking technique, the proposed protocol supports the private set intersection among multiple participants. Meanwhile, the set size privacy of the designated participant is preserved. The proposed protocol is proved to be secure against semi-honest participants under the decisional composite residuosity assumption. Finally, the efficiency of our protocol is illustrated through both performance analyses and comparisons of related work.



Efficient Function Queryable and Privacy Preserving Data Aggregation Scheme in Smart Grid

December 2022

·

29 Reads

·

31 Citations

IEEE Transactions on Parallel and Distributed Systems

The collection of users’ near-real-time electricity consumption data brings advantages to the operation of smart grids, while raising some security and privacy issues. Multiple privacy preserving data aggregation schemes have been proposed to address these problems. However, most schemes only focus on the aggregation of electricity consumption data without considering the data availability. In addition, although a data aggregation scheme that supports function queries on encrypted data has also been developed, its efficiency is insufficient. In this paper, we first propose an EC-ElGamal encryption algorithm with a double trapdoor decryption mechanism. Through employing the proposed algorithm and the elliptic curve Schnorr signature scheme, an efficient data aggregation scheme supporting privacy protection and function query is proposed for smart grids. This solution allows the control center and users to initiate various function queries on encrypted data. In order to lighten the calculation burden of the control center, we propose another cryptosystem named ElGamal-OU to improve the decryption efficiency, which also supports two independent decryption methods. Finally, the security analysis and performance comparison with related work show that our schemes have advantages in terms of computational, communication and storage overhead.


MDOPE: Efficient Multi-dimensional Data Order Preserving Encryption Scheme

March 2022

·

60 Reads

·

22 Citations

Information Sciences

Nowadays, tremendous information technology industries resort to cloud servers to store data with an outsourcing approach to extend their storage and computation power. This, however, also leads to privacy and security issues of unprotected data against curious cloud servers. The most common solution currently is to encrypt the data before uploading it. The problem is that encrypted data is out of control and users also cannot transfer the searching job to cloud serves anymore. Specifically, the order preserving encryption (OPE) provides an efficient solution to the order of plaintexts. Existing OPE schemes focus on single-dimensional data, and fail to effectively process multi-dimensional data. In this paper, we propose a multi-dimensional data order preserving encryption scheme MDOPE allowing fine-grained multi-dimensional range queries. Our scheme constructs query indexes for each dimension of the data based on the order preserving encryption network. In particular, the proposed scheme ensures that no external entity, including the cloud server, can obtain additional information other than the order of ciphertexts during the whole query process.


Cryptanalysis of an Additively Homomorphic Public Key Encryption Scheme

January 2022

·

25 Reads

·

2 Citations

Computer Standards & Interfaces

Based on the ElGamal cryptosystem, Bae et al. (J. Netw. Comput. Appl., vol. 59, pp. 333–344, 2016) proposed a new homomorphic encryption algorithm to reduce the network traffic and data processing time brought by their data communication and aggregation scheme. However, there is no security analysis of this encryption algorithm in their scheme. In this paper, we analyze the security of their proposed encryption algorithm and prove that it is not secure.


System model in [19]
Our system model
Comparisons of computation cost
Comparisons of communication overhead
Privacy-preserving association rule mining based on electronic medical system

January 2022

·

32 Reads

·

13 Citations

Wireless Networks

Privacy protection during collaborative distributed association rule mining is an important research, which has been widely used in market prediction, medical research and other fields. In medical research, Domadiya et al. (Sadhana 43(8):127, 2018) focused on mining association rules from horizontally distributed healthcare data to diagnose heart disease. They claimed they proposed a more effective privacy-preserving distributed association rule mining (PPDARM) scheme. However, a serious security scrutiny of the scheme is performed, and we find it vulnerable to protect the support of the itemsets from any electronic health record (EHR) system, which is the most important parameter Domadiya et al. tried to protect. In this paper, we first present the cryptanalysis of the PPDARM scheme proposed by Domadiya et al. as well as some revised performance analyses. Then a new PPDARM scheme with less interactions is proposed to avert the shortcomings of Domadiya et al., using the homomorphic properties of the distributed Paillier cryptosystem to accomplish the cooperative computation. Our scheme allows the directed authority (miner) to obtain the final results rather than all cooperative EHR systems, in case of semi-honest but pseudo EHR systems. Moreover, security analysis and performance evaluation demonstrate our proposal is efficient and feasible.


DRBFT: Delegated Randomization Byzantine Fault Tolerance Consensus Protocol for Blockchains

January 2021

·

135 Reads

·

57 Citations

Information Sciences

Blockchain, as a potentially revolutionary technology, has been used in cryptocurrency to record transactions chronologically among multiple parties. Due to the fast development of the blockchain and its de-centralization, blockchain technology has been applied in broader scenarios, such as smart factories, supply chains, and smart cities. Consensus protocol plays a vital role in the blockchain, which addresses the issue of reaching consensus on transaction results among involved participants. Nevertheless, with the complexity of the network environment and growing amount of network users, the advance of blockchain is gradually restricted by the efficiency, security and reliability of consensus protocols. In this paper, we propose a delegated randomization Byzantine fault tolerance consensus protocol named DRBFT based on Practical Byzantine Fault Tolerance(PBFT) to enhance the efficiency and reliability of the consensus procedure. Specifically, a random selection algorithm called RS is developed to cooperate with the voting mechanism, which can effectively reduce the number of nodes participating in the consensus process. Our proposed scheme is characterized by the unpredictability, randomicity and impartiality, which accelerate the system to reach consensus on the premise of ensuring the system activity. Furthermore, the feasibility of our proposed scheme is also proved by both theoretical analysis and experimental evaluations.


Citations (15)


... Системи на основі гомоморфного шифрування потребують додатково схеми доказу. Це може бути або доказ нульового розголошення, або довіри до адміністратора під час збору даних, або додаткових схем часткового розшифрування [3]. ...

Reference:

Analysis of approaches of electronic voting systems implementationАНАЛІЗ ПІДХОДІВ ДО РЕАЛІЗАЦІЇ СИСТЕМ ЕЛЕКТРОННОГО ГОЛОСУВАННЯ
Efficient Electronic Voting System Based on Homomorphic Encryption

... MPC is a multi-party private computation technique that does not require a trusted third party, and was proposed by Turing Award winner Andrew Chi-Chih Yao in 1982 to answer the millionaire problem [9]. MPC allows multiple participants to jointly compute an objective function while guaranteeing that each party only obtains its own computational results and cannot infer the input data of any other party [10][11][12]. ...

Hiding the input-size in multi-party private set intersection

Designs Codes and Cryptography

... As the geographical data usually have multiple dimensions, these OPE methods are not suitable to process the geographical data. Recently, Zhan et al. [27] proposed an OPE method to support efficient range query over the ciphertexts of multi-dimensional data. However, as the order information is not protected in these OPE methods, attackers can analyze the order information of the ciphertexts and then infer the underlying plaintexts [7]. ...

MDOPE: Efficient Multi-dimensional Data Order Preserving Encryption Scheme
  • Citing Article
  • March 2022

Information Sciences

... Zhan et al. [13] introduced an enhanced encryption algorithm that builds upon the foundational EC-ElGamal cryptosystem, incorporating a novel double live gate decryption approach. This algorithm exhibits homomorphic properties and facilitates data decryption and functional interrogation by SM and CC. ...

Efficient Function Queryable and Privacy Preserving Data Aggregation Scheme in Smart Grid
  • Citing Article
  • December 2022

IEEE Transactions on Parallel and Distributed Systems

... Recently, machine learning (ML) approaches have also been employed to preserve the privacy of individuals in data analysis and publishing [31][32][33][34][35]. ML approaches have significantly improved the traditional privacy preserving approaches by extracting attribute level information from data. Furthermore, ML approaches have created synergy with most of the approaches listed in Figure 4 to effectively preserve individual privacy [36][37][38][39]. ...

Cryptanalysis of an Additively Homomorphic Public Key Encryption Scheme
  • Citing Article
  • January 2022

Computer Standards & Interfaces

... Data driven technologies have become key to providing quality patient care as the healthcare sector gets more data driven. Due to rising volume of sensitive health data being generated with Electronic Health Records (EHR), medical imaging, genomics data, and wearable health monitoring systems, we are now beginning to see the so called 'big data' that tracks patients over time [1]. Extremely interesting data but it's very useful for research, decision making process as well as a personalized medicine. ...

Privacy-preserving association rule mining based on electronic medical system

Wireless Networks

... Techniques of addressing security and reliability issues include Moving Target Defense (MTD) [9][10][11], Cyber Mimic Defense (CMD) [12,13], Byzantine Fault Tolerance [14][15][16], and Redundancy Fault Tolerance [17,18] technologies. The characteristics of these technologies are summarized in Table 1. ...

DRBFT: Delegated Randomization Byzantine Fault Tolerance Consensus Protocol for Blockchains
  • Citing Article
  • January 2021

Information Sciences

... The aggregated signature algorithm is based on the ECDLP, and the proof of security can be found in [36]. The data consumers signs the fresh identity proof TN with secret key s DC i to respond to the authentication challenge. ...

Cryptanalysis and Improvement of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks
  • Citing Article
  • October 2020

IEEE Internet of Things Journal

... A CLAS scheme for c-HMS was introduced by Kumar et al. [15], touted as provably secure in the ROM. However, separate analyses by Xie et al. [16] and Zhan et al. [17] indicated vulnerability of the scheme [15] against a Type II adversary. To curtail computational costs, Du et al. [18] and Gayathri et al. [19] individually developed a CLAS scheme for c-HMS, with neither scheme requiring a pairing operation. ...

Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network