IoT meets blockchain: Parallel distributed architecture for data storage and sharing

S Liu, J Wu, C Long - … Conference on Internet of Things (iThings …, 2018 - ieeexplore.ieee.org
The rapid development of Internet of Things technology has led to the sharp increase of the
number of interconnected devices. A large amount of data is generated by large-scale loT …

Content-based transport security

ME Mosko, E Uzun - US Patent 9,954,678, 2018 - Google Patents
A computer system can send a secure request over a named-data network to a remote
device by generating an Interest with encrypted name components. During operation, the …

Anonymous attribute-based conditional proxy re-encryption

X Mao, X Li, X Wu, C Wang, J Lai - … , NSS 2018, Hong Kong, China, August …, 2018 - Springer
Attribute-based conditional proxy re-encryption (AB-CPRE) enables ciphertext owners to
carry out fine-grained decryption delegation control. In AB-CPRE schemes, we observe that …

Preserving the incumbent users' location privacy in the 3.5 ghz band

H Li, Y Dou, C Lu, D Zabransky… - … on Dynamic Spectrum …, 2018 - ieeexplore.ieee.org
In dynamic spectrum sharing (DSS) ecosystem with non-informing incumbent users (IUs),
Environmental Sensing Capability (ESC) system has been proposed to detect IU activity …

[PDF][PDF] Nucypher: A proxy re-encryption network to empower privacy in decentralized systems

M Egorov, D Nuñez, M Wilkison - NuCypher whitepaper, 2018 - awebanalysis.com
NuCypher is a decentralized key management system (KMS), encryption, and access
control service. It enables private data sharing between arbitrary numbers of participants in …

Multi-key homomorphic proxy re-encryption

S Yasuda, Y Koseki, R Hiromasa, Y Kawai - Information Security: 21st …, 2018 - Springer
In this paper, we propose a new notion of multi-key homomorphic proxy re-encryption (MH-
PRE) in which inputs of homomorphic evaluation are encrypted by different public keys and …

Improved functional proxy re-encryption schemes for secure cloud data sharing

XA Wang, X Yang, C Li, Y Liu, Y Ding - Computer Science and …, 2018 - doiserbia.nb.rs
Recently Liang et al. propose an interesting privacy-preserving ciphertext multi-sharing
control for big data storage mechanism, which is based on the cryptographic primitive of …

SRCPR: SignReCrypting proxy re-signature in secure VANET groups

S Kanchan, NS Chaudhari - IEEE Access, 2018 - ieeexplore.ieee.org
Vehicular Ad hoc Network is an emerging area as a key component of the intelligent
transport system. Despite the immense researches going on in this area, it is yet to be …

Rsa-based collusion resistant quorum controlled proxy re-encryption scheme for distributed secure communication

SM Patil, BR Purushothama - International Conference on Distributed …, 2018 - Springer
In this paper, we analyze the quorum controlled proxy re-encryption scheme proposed by
Jakobsson for the security. We show that the scheme is susceptible to collusion and cannot …

KRB-CCN: Lightweight Authentication and Access Control for Private Content-Centric Networks

IO Nunes, G Tsudik - Applied Cryptography and Network Security: 16th …, 2018 - Springer
Abstract Content-Centric Networking (CCN) is an internetworking paradigm that offers an
alternative to today's IP-based Internet Architecture. Instead of focusing on hosts and their …