Cloud-based data-sharing scheme using verifiable and cca-secure re-encryption from indistinguishability obfuscation

M Zhang, Y Jiang, H Shen, B Li, W Susilo - International Conference on …, 2018 - Springer
A cloud-based re-encryption scheme allows a semi-trusted cloud proxy to convert a
ciphertext under delegator's public-key into a ciphertext of delegatee's. However, for an …

Privacy preserving cloud data sharing system with flexible control

L Fang, C Ge, Z Huang, J Wang - Computers & Electrical Engineering, 2018 - Elsevier
With the development of cloud technology, sharing date between users securely becomes
more and more important. Moreover, the cloud server should provide a flexible control on …

Bi-objective analysis of an adaptive secure data storage in a multi-cloud

EC Lopez-Falcon, V Miranda-López… - Latin American High …, 2018 - Springer
Security issues related to cloud computing as well as all solutions proposed in the literature
are one of the high topics for research. However, there are many unsolved problems …

Transferring state in content centric network stacks

I Solis - US Patent 9,986,034, 2018 - Google Patents
One embodiment of the present invention provides a system that facilitates the transfer of the
state of a stack in a content centric network. During operation, the system receives, by a …

A Source Hiding Identity‐Based Proxy Reencryption Scheme for Wireless Sensor Network

C Ge, J Xia, A Wu, H Li, Y Wang - Security and Communication …, 2018 - Wiley Online Library
Wireless sensor network (WSN), which extends the typical Internet environment to Internet of
Things, has been deployed in various environments such as safety monitoring, intelligent …

Order encoded manifests in a content centric network

ME Mosko, I Solis, GC Scott, CA Wood - US Patent 9,946,743, 2018 - Google Patents
One embodiment provides a system that facilitates direct seeking of the ordered content of a
manifest based on external metadata. During operation, the system determines, by a content …

A new insight—proxy re-encryption under LWE with strong anti-collusion

W Yin, Q Wen, W Li, H Zhang, Z Jin - Information Security Practice and …, 2018 - Springer
Proxy re-encryption is a special type of public key encryption that allows an intermediate
proxy to transform a ciphertext from one public key to another without learning any …

StackSync: Attribute‐based data sharing in file synchronization services

M Sánchez‐Artigas, C Cotes… - Concurrency and …, 2018 - Wiley Online Library
Personal Cloud (PC) storage services such as Dropbox or Google Drive have become
increasingly popular in the last few years. Unfortunately, these services are still not secure …

Secure proxy-reencryption-based inter-network key exchange

L Greenwald, K Rohloff, D Stott - MILCOM 2018-2018 IEEE …, 2018 - ieeexplore.ieee.org
In this paper we present a novel approach to distribute session keys securely across
administrative boundaries where participants may be unable to interact directly. The basis of …

An efficient traceable data sharing scheme in cloud computing for mobile devices

Z Wang, J Ye, J Wang - International Journal of High …, 2018 - inderscienceonline.com
Owing to the convenience of mobile devices and the advantages of cloud computing, it is a
fashion to efficiently share data by mobile devices in cloud computing. However, it might be …