Proxy re-encryption: Analysis of constructions and its application to secure access delegation

D Nuñez, I Agudo, J Lopez - Journal of Network and Computer Applications, 2017‏ - Elsevier
This paper analyzes the secure access delegation problem, which occurs naturally in the
cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from …

Method and system to securely migrate and provision virtual machine images and content

Y Raghuram, S Orrin, AJ Munoz - US Patent 8,924,720, 2014‏ - Google Patents
BACKGROUND The use of cloud computing environments is being adopted at a rapid pace,
particularly by businesses. Software develop ment companies have introduced numerous …

Comparison and search operations of encrypted data

DF Bacon, GA Bent, FA Bergamaschi - US Patent 9,742,556, 2017‏ - Google Patents
Searching for desired data within an encrypted set of data (using a fully homomorphic
encryption) without decrypting the set of data. A lookup key is compared against a set of …

Enhancing Security of Sensor Data for a System Via an Embedded Controller

GA Stewart - US Patent App. 13/843,530, 2013‏ - Google Patents
BACKGROUND 0003 Increasingly, computers are under threat of mali cious tampering or
intrusion, eg, from unauthorized users, either locally or over networks. Identity theft, theft of …

Customer call logging data privacy in cloud infrastructure

LP Papadopoulos, RN Dunn, AM Varghese - US Patent 10,250,385, 2019‏ - Google Patents
US10250385B2 - Customer call logging data privacy in cloud infrastructure - Google
Patents US10250385B2 - Customer call logging data privacy in cloud infrastructure …

Providing access control and identity verification for communications when initiating a communication to an entity to be verified

S Shaffer, Y Schwartz, AJ Shockley - US Patent 12,021,866, 2024‏ - Google Patents
The techniques herein are directed generally to providing access control and identity
verification for communications when initiating a communication to an entity to be verified. In …

Proxy re-encryption

D Nuez, I Agudo, J Lopez - Journal of Network and Computer …, 2017‏ - dl.acm.org
This paper analyzes the secure access delegation problem, which occurs naturally in the
cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from …

Homomorphic encryption based high integrity computing system

DA Miller, MA Kovalan, DC Matthews - US Patent 10,382,194, 2019‏ - Google Patents
(57) ABSTRACT A homomorphic encryption based high integrity computing system
including a processing system including a single string computation channel configured to …

Method and system to securely migrate and provision virtual machine images and content

Y Ranghuram, S Orrin, AJ Munoz - US Patent 9,252,946, 2016‏ - Google Patents
US9252946B2 - Method and system to securely migrate and provision virtual machine
images and content - Google Patents US9252946B2 - Method and system to securely …

Providing access control and identity verification for communications when receiving a communication at an entity to be verified

S Shaffer, Y Schwartz, AJ Shockley - US Patent 11,637,827, 2023‏ - Google Patents
US11637827B2 - Providing access control and identity verification for communications
when receiving a communication at an entity to be verified - Google Patents …