Revocable identity-based broadcast proxy re-encryption for data sharing in clouds
Cloud computing has become prevalent due to its nature of massive storage and vast
computing capabilities. Ensuring a secure data sharing is critical to cloud applications …
computing capabilities. Ensuring a secure data sharing is critical to cloud applications …
[HTML][HTML] Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain
Data is central to the Internet of Things (IoT) ecosystem. With billions of devices connected,
most of the current IoT systems are using centralized cloud-based data sharing systems …
most of the current IoT systems are using centralized cloud-based data sharing systems …
Blockchain based proxy re-encryption scheme for secure IoT data sharing
Data is central to the Internet of Things IoT ecosystem. Most of the current IoT systems are
using centralized cloud-based data sharing systems. Involvement of such third-party service …
using centralized cloud-based data sharing systems. Involvement of such third-party service …
P2B: Privacy preserving identity-based broadcast proxy re-encryption
This paper proposes Privacy Preserving Identity-Based Broadcast Proxy Re-encryption
(P2B)-a scheme to provide privacy preserving in identity-based broadcast proxy re …
(P2B)-a scheme to provide privacy preserving in identity-based broadcast proxy re …
Hybrid lightweight proxy re-encryption scheme for secure fog-to-things environment
OA Khashan - IEEE Access, 2020 - ieeexplore.ieee.org
Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central
processing of the vast amount of IoT data. Although fog computing has the advantages of …
processing of the vast amount of IoT data. Although fog computing has the advantages of …
Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks
The wireless body area network (WBAN) provides users with real-time medical services.
Meanwhile, the cloud technology provides greater storage space and computing power for …
Meanwhile, the cloud technology provides greater storage space and computing power for …
Autonomous path identity-based broadcast proxy re-encryption for data sharing in clouds
H Hu, Z Cao, X Dong - IEEE Access, 2022 - ieeexplore.ieee.org
Cloud computing with massive storage and computing capabilities has become widespread
in actual applications. It is critical to ensure secure data sharing in cloud-based applications …
in actual applications. It is critical to ensure secure data sharing in cloud-based applications …
Dynamic encrypted data sharing scheme based on conditional proxy broadcast re-encryption for cloud storage
L Jiang, D Guo - IEEE Access, 2017 - ieeexplore.ieee.org
Since Cloud Service Provider is a semi-trusted party in cloud storage, to protect data from
being disclosed, users' data are encrypted before being uploaded to a cloud server …
being disclosed, users' data are encrypted before being uploaded to a cloud server …
KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage
Key-aggregate cryptosystems (KAC) have attracted significant attention from the research
community because of their elegance and efficiency in enforcing predefined access control …
community because of their elegance and efficiency in enforcing predefined access control …
A lattice-based homomorphic proxy re-encryption scheme with strong anti-collusion for cloud computing
J Li, Z Qiao, K Zhang, C Cui - Sensors, 2021 - mdpi.com
The homomorphic proxy re-encryption scheme combines the characteristics of a
homomorphic encryption scheme and proxy re-encryption scheme. The proxy can not only …
homomorphic encryption scheme and proxy re-encryption scheme. The proxy can not only …