A secure flexible and tampering-resistant data sharing system for vehicular social networks
Vehicular social networks (VSNs) have emerged as the promising paradigm of vehicular
networks that can improve traffic safety, relieve traffic congestion and even provide …
networks that can improve traffic safety, relieve traffic congestion and even provide …
Design of secure and privacy-preserving data sharing scheme based on key aggregation and private set intersection in medical information system
Medical data sharing is pivotal in enhancing accessibility and collaboration among
healthcare providers, researchers, and institutions, ultimately leading to enhanced patient …
healthcare providers, researchers, and institutions, ultimately leading to enhanced patient …
KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage
Key-aggregate cryptosystems (KAC) have attracted significant attention from the research
community because of their elegance and efficiency in enforcing predefined access control …
community because of their elegance and efficiency in enforcing predefined access control …
Parallel key-insulated multiuser searchable encryption for industrial Internet of Things
With the rapid development of the industrial Internet of Things (IIoT) and cloud computing, an
increasing number of companies outsource their data to cloud servers to save costs. To …
increasing number of companies outsource their data to cloud servers to save costs. To …
Key-aggregate based access control encryption for flexible cloud data sharing
Cloud computing has become the priority for users to store and share data due to its
numerous tempting advantages. The “encryption-before-outsourcing” mechanism is …
numerous tempting advantages. The “encryption-before-outsourcing” mechanism is …
Efficient Key-Aggregate Cryptosystem with User Revocation for Selective Group Data Sharing in Cloud Storage
Cloud computing has become prevalent due to its extensive storage resources and robust
computational capacities. To protect data security and privacy, data owners opt for …
computational capacities. To protect data security and privacy, data owners opt for …
Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance
Proxy Re-encryption (PRE) offers an efficient solution for enforcing access control on
outsourced data through delegation of decryption rights of a delegator to a delegatee …
outsourced data through delegation of decryption rights of a delegator to a delegatee …
MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data
Recent attempts at key-aggregate searchable encryption (KASE) combine the advantages of
searching encrypted data with support for data owners to share an aggregate searchable …
searching encrypted data with support for data owners to share an aggregate searchable …
Blockchain-Based Revocable Key-Aggregate Searchable Encryption for Group Data Sharing in Cloud-Assisted Industrial IoT
K Zhang, X Hu, J Zhao, L Wei… - IEEE Internet of Things …, 2025 - ieeexplore.ieee.org
In the cloud-assisted Industrial Internet of Things (IIoT), flexible and secure data sharing
promotes industry processes optimization and new products-making. To enable selective …
promotes industry processes optimization and new products-making. To enable selective …
Efficient dynamic key‐aggregate cryptosystem for secure and flexible data sharing
Secure and efficient enforcement of dynamic access control policies on shared data is a
central problem in dynamic and scalable application scenarios, including the Internet of …
central problem in dynamic and scalable application scenarios, including the Internet of …