Revocable identity-based broadcast proxy re-encryption for data sharing in clouds

C Ge, Z Liu, J **a, L Fang - IEEE transactions on dependable …, 2019 - ieeexplore.ieee.org
Cloud computing has become prevalent due to its nature of massive storage and vast
computing capabilities. Ensuring a secure data sharing is critical to cloud applications …

[HTML][HTML] Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain

A Manzoor, A Braeken, SS Kanhere, M Ylianttila… - Journal of Network and …, 2021 - Elsevier
Data is central to the Internet of Things (IoT) ecosystem. With billions of devices connected,
most of the current IoT systems are using centralized cloud-based data sharing systems …

Blockchain based proxy re-encryption scheme for secure IoT data sharing

A Manzoor, M Liyanage, A Braeke… - … on blockchain and …, 2019 - ieeexplore.ieee.org
Data is central to the Internet of Things IoT ecosystem. Most of the current IoT systems are
using centralized cloud-based data sharing systems. Involvement of such third-party service …

P2B: Privacy preserving identity-based broadcast proxy re-encryption

S Maiti, S Misra - IEEE Transactions on Vehicular Technology, 2020 - ieeexplore.ieee.org
This paper proposes Privacy Preserving Identity-Based Broadcast Proxy Re-encryption
(P2B)-a scheme to provide privacy preserving in identity-based broadcast proxy re …

Hybrid lightweight proxy re-encryption scheme for secure fog-to-things environment

OA Khashan - IEEE Access, 2020 - ieeexplore.ieee.org
Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central
processing of the vast amount of IoT data. Although fog computing has the advantages of …

Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks

Y Zhou, L Zhao, Y **, F Li - Information Sciences, 2022 - Elsevier
The wireless body area network (WBAN) provides users with real-time medical services.
Meanwhile, the cloud technology provides greater storage space and computing power for …

Autonomous path identity-based broadcast proxy re-encryption for data sharing in clouds

H Hu, Z Cao, X Dong - IEEE Access, 2022 - ieeexplore.ieee.org
Cloud computing with massive storage and computing capabilities has become widespread
in actual applications. It is critical to ensure secure data sharing in cloud-based applications …

Dynamic encrypted data sharing scheme based on conditional proxy broadcast re-encryption for cloud storage

L Jiang, D Guo - IEEE Access, 2017 - ieeexplore.ieee.org
Since Cloud Service Provider is a semi-trusted party in cloud storage, to protect data from
being disclosed, users' data are encrypted before being uploaded to a cloud server …

KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage

G Pareek, BR Purushothama - Journal of information security and …, 2021 - Elsevier
Key-aggregate cryptosystems (KAC) have attracted significant attention from the research
community because of their elegance and efficiency in enforcing predefined access control …

A lattice-based homomorphic proxy re-encryption scheme with strong anti-collusion for cloud computing

J Li, Z Qiao, K Zhang, C Cui - Sensors, 2021 - mdpi.com
The homomorphic proxy re-encryption scheme combines the characteristics of a
homomorphic encryption scheme and proxy re-encryption scheme. The proxy can not only …