Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

S Ullah, J Zheng, N Din, MT Hussain, F Ullah… - Computer Science …, 2023‏ - Elsevier
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …

Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017‏ - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

The security of big data in fog-enabled IoT applications including blockchain: A survey

N Tariq, M Asim, F Al-Obeidat, M Zubair Farooqi… - Sensors, 2019‏ - mdpi.com
The proliferation of inter-connected devices in critical industries, such as healthcare and
power grid, is changing the perception of what constitutes critical infrastructure. The rising …

A blockchain-based medical data sharing and protection scheme

X Liu, Z Wang, C **, F Li, G Li - IEEE Access, 2019‏ - ieeexplore.ieee.org
Electronic health record (EHR) has recorded the process of occurrence, development, and
treatment of diseases. So it has high medical value. Owing to the private and sensitive …

[كتاب][B] A fully homomorphic encryption scheme

C Gentry - 2009‏ - search.proquest.com
We propose the first fully homomorphic encryption scheme, solving an old open problem.
Such a scheme allows one to compute arbitrary functions over encrypted data without the …

Revocable identity-based broadcast proxy re-encryption for data sharing in clouds

C Ge, Z Liu, J **a, L Fang - IEEE transactions on dependable …, 2019‏ - ieeexplore.ieee.org
Cloud computing has become prevalent due to its nature of massive storage and vast
computing capabilities. Ensuring a secure data sharing is critical to cloud applications …

Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges

J Domingo-Ferrer, O Farras, J Ribes-González… - Computer …, 2019‏ - Elsevier
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …

Attribute based data sharing with attribute revocation

S Yu, C Wang, K Ren, W Lou - Proceedings of the 5th ACM symposium …, 2010‏ - dl.acm.org
Ciphertext-Policy Attribute Based Encryption (CP-ABE) is a promising cryptographic
primitive for fine-grained access control of shared data. In CP-ABE, each user is associated …

Key-aggregate cryptosystem for scalable data sharing in cloud storage

CK Chu, SSM Chow, WG Tzeng… - IEEE transactions on …, 2013‏ - ieeexplore.ieee.org
Data sharing is an important functionality in cloud storage. In this paper, we show how to
securely, efficiently, and flexibly share data with others in cloud storage. We describe new …

Key homomorphic PRFs and their applications

D Boneh, K Lewi, H Montgomery… - Annual Cryptology …, 2013‏ - Springer
A pseudorandom function F:\mathcalK*\mathcalX→\mathcalY is said to be key homomorphic
if given F (k 1, x) and F (k 2, x) there is an efficient algorithm to compute F (k 1⊕ k 2, x) …