|
|
|
Meijuan Huang, Yutian Liu, Bo Yang, Yanqi Zhao and Mingrui Zhang
Revocable attribute-based encryption (RABE) provides greater flexibility and fine-grained access control for data sharing. However, the revocation process for most RABE schemes today is performed by the cloud storage provider (CSP). Since the CSP is an h...
ver más
|
|
|
|
|
|
|
Huifeng Fan, Ruwei Huang and Fengting Luo
Aiming at the problem that the fully homomorphic encryption scheme based on single identity cannot satisfy the homomorphic operation of ciphertext under different identities, as well as the inefficiency of trapdoor function and the complexity of sampling...
ver más
|
|
|
|
|
|
|
Maki Kihara and Satoshi Iriyama
A new class of cryptosystems called verifiable encryption (VE) that facilitates the verification of two plaintexts without decryption was proposed in our previous paper. The main contributions of our previous study include the following. (1) Certain cryp...
ver más
|
|
|
|
|
|
|
Yang Yang and Guanghua Song
Outsourcing computation has become increasingly popular due to its cost-effectiveness, enabling users with limited resources to conduct large-scale computations on potentially untrusted cloud platforms. In order to safeguard privacy, verifiable computing...
ver más
|
|
|
|
|
|
|
Tao Feng, Dewei Wang and Renbin Gong
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine...
ver más
|
|
|
|
|
|
|
Saci Medileh, Abdelkader Laouid, Mohammad Hammoudeh, Mostefa Kara, Tarek Bejaoui, Amna Eleyan and Mohammed Al-Khalidi
In today?s hyperconnected world, the Internet of Things and Cloud Computing complement each other in several areas. Cloud Computing provides IoT systems with an efficient and flexible environment that supports application requirements such as real-time c...
ver más
|
|
|
|
|
|
|
Nigang Sun, Chenyang Zhu, Yuanyi Zhang and Yining Liu
Digital transformation of the logistics industry triggered by the widespread use of Internet of Things (IoT) technology has prompted a significant revolution in logistics companies, further bringing huge dividends to society. However, the concurrent acce...
ver más
|
|
|
|
|
|
|
Yongbo Jiang, Juncheng Lu and Tao Feng
Searchable encryption is a keyword-based ciphertext retrieval scheme, which can selectively retrieve encrypted documents on encrypted cloud data. Most existing searchable encryption schemes focus only on exact keyword searches and cannot return data of i...
ver más
|
|
|
|
|
|
|
Zhu Fang and Zhengquan Xu
Advances in network technology have enhanced the concern for network security issues. In order to address the problem that hopping graph are vulnerable to external attacks (e.g., the changing rules of fixed graphs are more easily grasped by attackers) an...
ver más
|
|
|
|
|
|
|
Nursulu Kapalova, Kairat Sakan, Kunbolat Algazy and Dilmukhanbet Dyusenbayev
A new symmetric block cipher algorithm called AL02 has been developed. The algorithm scheme provides five-round encryption of 128-bit blocks, while the data size at the input and output of the S-box is 8 bits. The main transformation is the F transformat...
ver más
|
|
|
|