A secure flexible and tampering-resistant data sharing system for vehicular social networks

J Sun, H **ong, S Zhang, X Liu, J Yuan… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Vehicular social networks (VSNs) have emerged as the promising paradigm of vehicular
networks that can improve traffic safety, relieve traffic congestion and even provide …

Design of secure and privacy-preserving data sharing scheme based on key aggregation and private set intersection in medical information system

J Oh, S Son, DK Kwon, M Kim, Y Park, Y Park - Mathematics, 2024 - mdpi.com
Medical data sharing is pivotal in enhancing accessibility and collaboration among
healthcare providers, researchers, and institutions, ultimately leading to enhanced patient …

KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage

G Pareek, BR Purushothama - Journal of information security and …, 2021 - Elsevier
Key-aggregate cryptosystems (KAC) have attracted significant attention from the research
community because of their elegance and efficiency in enforcing predefined access control …

Parallel key-insulated multiuser searchable encryption for industrial Internet of Things

J Cui, J Lu, H Zhong, Q Zhang, C Gu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the rapid development of the industrial Internet of Things (IIoT) and cloud computing, an
increasing number of companies outsource their data to cloud servers to save costs. To …

Key-aggregate based access control encryption for flexible cloud data sharing

J Liu, J Qin, W Wang, L Mei, H Wang - Computer Standards & Interfaces, 2024 - Elsevier
Cloud computing has become the priority for users to store and share data due to its
numerous tempting advantages. The “encryption-before-outsourcing” mechanism is …

Efficient Key-Aggregate Cryptosystem with User Revocation for Selective Group Data Sharing in Cloud Storage

J Liu, J Qin, X Zhang, H Wang - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Cloud computing has become prevalent due to its extensive storage resources and robust
computational capacities. To protect data security and privacy, data owners opt for …

Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance

G Pareek, BR Purushothama - Journal of Information Security and …, 2020 - Elsevier
Proxy Re-encryption (PRE) offers an efficient solution for enforcing access control on
outsourced data through delegation of decryption rights of a delegator to a delegatee …

MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data

M Padhya, DC **wala - Frontiers of Information Technology & Electronic …, 2019 - Springer
Recent attempts at key-aggregate searchable encryption (KASE) combine the advantages of
searching encrypted data with support for data owners to share an aggregate searchable …

Blockchain-Based Revocable Key-Aggregate Searchable Encryption for Group Data Sharing in Cloud-Assisted Industrial IoT

K Zhang, X Hu, J Zhao, L Wei… - IEEE Internet of Things …, 2025 - ieeexplore.ieee.org
In the cloud-assisted Industrial Internet of Things (IIoT), flexible and secure data sharing
promotes industry processes optimization and new products-making. To enable selective …

Efficient dynamic key‐aggregate cryptosystem for secure and flexible data sharing

G Pareek, S Maiti - Concurrency and Computation: Practice …, 2023 - Wiley Online Library
Secure and efficient enforcement of dynamic access control policies on shared data is a
central problem in dynamic and scalable application scenarios, including the Internet of …