Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 5 (2013)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)

Research Article
An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network

Maryam Azadmanesh; Behrouz Shahgholi Ghahfarokhi; Maede Ashouri-Talouki

Articles in Press, Accepted Manuscript, Available Online from 04 September 2022

https://doi.org/10.22042/isecure.2022.320282.735

Abstract
  Using generative models to produce unlimited synthetic samples is a popular replacement for database sharing. Generative Adversarial Network (GAN) is a popular class of generative models which generates synthetic data samples very similar to real training datasets. However, GAN models do not necessarily ...  Read More

Research Article
A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes
Articles in Press, Accepted Manuscript, Available Online from 30 November 1999

https://doi.org/10.22042/isecure.2023.171560

Abstract
  Digital signature schemes are used to guarantee for non-repudiation and authenticity of any kind of data like documents, messages or software. The Winternitz one-time signature (WOTS) scheme, which can be described using a certain number of so-called “function chains”, plays an important ...  Read More

Research Article
Secure Outsourcing of Two Standard Identity-Based Cryptosystems

Hamid Mala; Mohammad Reza Saeidi

Articles in Press, Accepted Manuscript, Available Online from 30 April 2023

https://doi.org/10.22042/isecure.2023.320345.734

Abstract
  In the last two decades bilinear pairings have found many applications in cryptography. Meanwhile identity-based cryptosystems based on bilinear pairings have received particular attention. The IEEE, IETF, and ISO organizations have been working on standardization of pairing-based cryptographic schemes. ...  Read More

Research Article
MISC: Multi-Input Secure Two-Party Computation

Farhad Taheri Ardakani; Siavash Bayat Sarmadi

Articles in Press, Accepted Manuscript, Available Online from 06 May 2023

https://doi.org/10.22042/isecure.2023.323624.745

Abstract
  Secure multi-party computation (MPC) allows a group of parties to compute a function on their private inputs securely. Classic MPC protocols for two parties use either Yao's garbled circuit (GC) or the Goldreich-Micali-Wigderson (GMW) protocol. In this paper, we propose MISC, a multi-input secure computation ...  Read More