{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:12:51Z","timestamp":1750306371536,"version":"3.41.0"},"reference-count":20,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2017,1,16]],"date-time":"2017-01-16T00:00:00Z","timestamp":1484524800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61472156"],"award-info":[{"award-number":["61472156"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"crossref","award":["2014CB340600"],"award-info":[{"award-number":["2014CB340600"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2017,5,31]]},"abstract":"<jats:p>When competing in eBay bidding, online games, or e-exams in embedded computing environments, people naturally face asynchronous starts from different computing devices, which is treated as a security risk of online contests. The security risks of online contests also include eavesdropping during data transmission without intended rights, and false starts by malicious competitors, which also means asynchrony in contests. Accordingly, online contests need security guarantees, especially on synchronization. In this article, for synchronic and secure starts in a contest, we update security requirements of confidentiality, anonymity, and synchrony, comparing the current work to our previous work. Based on the updated requirements, we propose a general framework for the Advanced Secure Synchronized Reading (ASSR) system, which can hold multiple contests simultaneously in the cloud. It is important to note that the system can ignore the impacts of heterogeneity among competitors. Considering the heterogeneity both on transmission and computing, we construct a novel Randomness-reused Identity Based Key Encapsulation Mechanism (RIBKEM) to support separable decapsulation, which can shorten both decryption delay and transmission delay with the best efforts. Finally, ASSR enhances synchronization achievement for contest starts with heterogeneous delays of competitors while satisfying other security requirements. As a complement, the analysis on the provable security of ASSR is given, as well as a further analysis on the achievement of synchronization.<\/jats:p>","DOI":"10.1145\/2899000","type":"journal-article","created":{"date-parts":[[2017,1,17]],"date-time":"2017-01-17T13:42:08Z","timestamp":1484660528000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Securely Reinforcing Synchronization for Embedded Online Contests"],"prefix":"10.1145","volume":"16","author":[{"given":"Wei","family":"Wang","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Peng","family":"Xu","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Laurence Tianruo","family":"Yang","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology and St. Francis Xavier University, NS, Canada"}]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[{"name":"University of Wollongong, Australia"}]},{"given":"Jinjun","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, NSW, Australia"}]}],"member":"320","published-online":{"date-parts":[[2017,1,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCS.2013.27"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/647097.717024"},{"key":"e_1_2_1_3_1","volume-title":"International Workshop on Public Key Cryptography. Springer, 85--99","author":"Bellare Mihir","year":"2003","unstructured":"Mihir Bellare , Alexandra Boldyreva , and Jessica Staddon . 2003 . Randomness re-use in multi-recipient encryption schemes . In International Workshop on Public Key Cryptography. Springer, 85--99 . Mihir Bellare, Alexandra Boldyreva, and Jessica Staddon. 2003. Randomness re-use in multi-recipient encryption schemes. In International Workshop on Public Key Cryptography. Springer, 85--99."},{"key":"e_1_2_1_4_1","first-page":"203","article-title":"Twenty years of attacks on the RSA cryptosystem","volume":"46","author":"Boneh Dan","year":"1999","unstructured":"Dan Boneh and others. 1999 . Twenty years of attacks on the RSA cryptosystem . Notices of the AMS 46 , 2, 203 -- 213 . Dan Boneh and others. 1999. Twenty years of attacks on the RSA cryptosystem. Notices of the AMS 46, 2, 203--213.","journal-title":"Notices of the AMS"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704155"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.14"},{"volume-title":"Wireless LAN medium access control (MAC) and physical layer (PHY) specifications","author":"IEEE LAN\/MAN Standards Committee and others. 2007. IEEE 802.11","key":"e_1_2_1_7_1","unstructured":"IEEE LAN\/MAN Standards Committee and others. 2007. IEEE 802.11 : Wireless LAN medium access control (MAC) and physical layer (PHY) specifications . In IEEE , June. IEEE LAN\/MAN Standards Committee and others. 2007. IEEE 802.11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. In IEEE, June."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/647097.717012"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2008.4472813"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2008.928909"},{"key":"e_1_2_1_11_1","first-page":"67","article-title":"Security and privacy in m-learning and beyond: Challenges and state-of-the-art. International Journal of u- and e-Service","volume":"6","author":"Kambourakis Georgios","year":"2013","unstructured":"Georgios Kambourakis . 2013 . Security and privacy in m-learning and beyond: Challenges and state-of-the-art. International Journal of u- and e-Service , Science and Technology 6 , 3, 67 -- 84 . Georgios Kambourakis. 2013. Security and privacy in m-learning and beyond: Challenges and state-of-the-art. International Journal of u- and e-Service, Science and Technology 6, 3, 67--84.","journal-title":"Science and Technology"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/295685.295716"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/646557.694751"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEWS.2008.4488131"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15317-4_1"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216370.1216373"},{"key":"e_1_2_1_17_1","volume-title":"Workshop on the Theory and Application of Cryptographic Techniques. Springer, 47--53","author":"Shamir Adi","year":"1984","unstructured":"Adi Shamir . 1984 . Identity-based cryptosystems and signature schemes . In Workshop on the Theory and Application of Cryptographic Techniques. Springer, 47--53 . Adi Shamir. 1984. Identity-based cryptosystems and signature schemes. In Workshop on the Theory and Application of Cryptographic Techniques. Springer, 47--53."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883421"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2401003"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2899000","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2899000","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:30Z","timestamp":1750222590000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2899000"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,16]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,5,31]]}},"alternative-id":["10.1145\/2899000"],"URL":"https:\/\/doi.org\/10.1145\/2899000","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2017,1,16]]},"assertion":[{"value":"2015-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-01-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}