Key escrow-free attribute based encryption with user revocation

R Zhang, J Li, Y Lu, J Han, Y Zhang - Information Sciences, 2022‏ - Elsevier
There exists a key escrow issue in ciphertext-policy attribute-based encryption (CP-ABE).
The key generator center issues all users' secret keys and can decrypt each ciphertext by …

[HTML][HTML] Revocation in attribute-based encryption for fog-enabled internet of things: A systematic survey

A Peñuelas-Angulo, C Feregrino-Uribe… - Internet of Things, 2023‏ - Elsevier
Attribute-based encryption (ABE) is a powerful cryptographic approach for providing fine-
grained access control and confidentiality security services. ABE is well suited for cloud …

Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud

Z Hou, J Ning, X Huang, S Xu, LY Zhang - Computer Standards & Interfaces, 2024‏ - Elsevier
Attribute-based encryption (ABE) has been widely applied in cloud services for access
control. However, a large number of pairing operations required for decryption affect the …

Fine-grained data sharing with enhanced privacy protection and dynamic users group service for the IoV

Y Bao, W Qiu, X Cheng, J Sun - IEEE Transactions on …, 2022‏ - ieeexplore.ieee.org
The Internet of Vehicles (IoV) is expected to play a revolutionary role in improving users'
driving experience and urban traffic governance. By widely absorbing emerging …

RCME: A reputation incentive committee consensus-based for matchmaking encryption in IoT healthcare

N Yang, C Tang, Z **ong, D He - IEEE Transactions on …, 2024‏ - ieeexplore.ieee.org
Matchmaking encryption is a method employed to address the security and privacy concerns
of cloud-enabled IoT healthcare. Nevertheless, matchmaking encryption technology …

Blockchain-based anonymous data sharing with accountability for Internet of Things

T Wu, W Wang, C Zhang, W Zhang… - IEEE Internet of …, 2022‏ - ieeexplore.ieee.org
Blockchain has been a promising infrastructure for enabling secure data sharing for the
Internet of Things (IoT). With the widespread of IoT applications, security issues, such as …

Privacy-preserving fine-grained data sharing with dynamic service for the cloud-edge IoT

J Sun, Y Bao, W Qiu, R Lu, S Zhang… - … on Dependable and …, 2024‏ - ieeexplore.ieee.org
The cloud-edge computing model has been expected to play a revolutionary role in
promoting the quality of future generation large-scale Internet of Things (IoT) services …

A lightweight certificateless multi-user matchmaking encryption for mobile devices: Enhancing security and performance

N Yang, C Tang, D He - IEEE Transactions on Information …, 2023‏ - ieeexplore.ieee.org
The technology for securely sharing data has grown extensively in recent years. Many users
are willing to share their lightweight mobile device data via social networks or the cloud. A …

Everything under control: secure data sharing mechanism for cloud-edge computing

Z Song, H Ma, R Zhang, W Xu… - IEEE Transactions on …, 2023‏ - ieeexplore.ieee.org
Cloud-edge computing is a new paradigm for data sharing. Many computation tasks are
assigned to multiple edge nodes to mitigate the computing burden of the cloud and data is …

Catch me if you can: A secure bilateral access control system with anonymous credentials

J Ma, S Xu, J Ning, X Huang… - IEEE Transactions on …, 2023‏ - ieeexplore.ieee.org
Bilateral access control model, emerging as a novel paradigm in access control, has
garnered extensive deployment within the domain of fog computing. This model offers on …