Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …
Cryptography (ECC). EC is often used to improve the security of open communication …
Securing fog computing for internet of things applications: Challenges and solutions
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …
exchange data for offering various applications, such as environmental monitoring …
The security of big data in fog-enabled IoT applications including blockchain: A survey
The proliferation of inter-connected devices in critical industries, such as healthcare and
power grid, is changing the perception of what constitutes critical infrastructure. The rising …
power grid, is changing the perception of what constitutes critical infrastructure. The rising …
A blockchain-based medical data sharing and protection scheme
Electronic health record (EHR) has recorded the process of occurrence, development, and
treatment of diseases. So it has high medical value. Owing to the private and sensitive …
treatment of diseases. So it has high medical value. Owing to the private and sensitive …
[كتاب][B] A fully homomorphic encryption scheme
C Gentry - 2009 - search.proquest.com
We propose the first fully homomorphic encryption scheme, solving an old open problem.
Such a scheme allows one to compute arbitrary functions over encrypted data without the …
Such a scheme allows one to compute arbitrary functions over encrypted data without the …
Revocable identity-based broadcast proxy re-encryption for data sharing in clouds
Cloud computing has become prevalent due to its nature of massive storage and vast
computing capabilities. Ensuring a secure data sharing is critical to cloud applications …
computing capabilities. Ensuring a secure data sharing is critical to cloud applications …
Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …
makes it increasingly necessary to use the cloud not just to store the data, but also to …
Attribute based data sharing with attribute revocation
Ciphertext-Policy Attribute Based Encryption (CP-ABE) is a promising cryptographic
primitive for fine-grained access control of shared data. In CP-ABE, each user is associated …
primitive for fine-grained access control of shared data. In CP-ABE, each user is associated …
Key-aggregate cryptosystem for scalable data sharing in cloud storage
Data sharing is an important functionality in cloud storage. In this paper, we show how to
securely, efficiently, and flexibly share data with others in cloud storage. We describe new …
securely, efficiently, and flexibly share data with others in cloud storage. We describe new …
Key homomorphic PRFs and their applications
A pseudorandom function F:\mathcalK*\mathcalX→\mathcalY is said to be key homomorphic
if given F (k 1, x) and F (k 2, x) there is an efficient algorithm to compute F (k 1⊕ k 2, x) …
if given F (k 1, x) and F (k 2, x) there is an efficient algorithm to compute F (k 1⊕ k 2, x) …