Browsing by Author "Wang, Yongge"
Now showing items 1-8 of 8
-
Almost BPXOR Coding Technique for Tolerating Three Disk Failures in RAID7 Architectures
Mhaisen, Naram; Punkar, Mayur; Wang, Yongge; Desmedt, Yvo; Malluhi, Qutaibah ( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Redundant Array of Independent Disks (RAID) storage architectures provide protection of digital infrastructure against potential disks failures. For example, RAID-5 and RAID-6 architectures provide protection against one ... -
Breaking HK17 in Practice
Li, Haoyu; Liu, Renzhang; Malluhi, Qutaibah M.; Pan, Yanbin; Wang, Yongge; Xie, Tianyuan... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)In November 2017, Hecht and Kamlofsky submitted HK17, a quaternion(octonion)-based Diffie-Hellman key exchange protocol, to NIST post-quantum cryptography project, and thought that at least O(p8) arithmetic operations are ... -
Candidate MDS array codes for tolerating three disk failures in RAID-7 architectures
Punekar, Mayur; Malluhi, Qutaibah; Wang, Yongge; Desmedt, Yvo ( Association for Computing Machinery, Inc , 2017 , Conference Paper)Current storage systems use RAID-5 and RAID-6 architectures to provide protection against one and two disk failures, respectively. However, as the size of storage system grows rapidly three concurrent disk failures are ... -
Data confidentiality in cloud-based pervasive system
Khan, Khaled M.; Shaheen, Mahboob; Wang, Yongge ( Association for Computing Machinery , 2017 , Conference Paper)Data confidentiality and privacy is a serious concern in pervasive systems where cloud computing is used to process huge amount of data such as matrix multiplications typically used in HPC. Due to limited processing ... -
Garbled computation in cloud
Wang, Yongge; Malluhi, Qutaibah M.; Khancb, Khaled MD ( Elsevier , 2016 , Article)With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ... -
Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes
Wang, Yongge; Malluhi, Qutaibah M. ( Springer Verlag , 2016 , Conference Paper)With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ... -
Reusable garbled turing machines without FHE
Wang, Yongge; Malluhi, Qutaibah M. ( Springer Verlag , 2019 , Conference Paper)Since Yao introduced the garbled circuit concept in 1980s, it has been an open problem to design efficient reusable garbled Turing machines/circuits. Recently, Goldwasser et al. and Garg et al. answered this question ... -
The limit of blockchains: Infeasibility of a smart obama-trump contract
Wang, Yongge; Malluhi, Qutaibah M. ( Association for Computing Machinery , 2019 , Article)Although smart contracts are Turing complete, it is a misconception that they can fulfill all routine contracts.