Cloud-based data-sharing scheme using verifiable and cca-secure re-encryption from indistinguishability obfuscation
A cloud-based re-encryption scheme allows a semi-trusted cloud proxy to convert a
ciphertext under delegator's public-key into a ciphertext of delegatee's. However, for an …
ciphertext under delegator's public-key into a ciphertext of delegatee's. However, for an …
Privacy preserving cloud data sharing system with flexible control
With the development of cloud technology, sharing date between users securely becomes
more and more important. Moreover, the cloud server should provide a flexible control on …
more and more important. Moreover, the cloud server should provide a flexible control on …
Bi-objective analysis of an adaptive secure data storage in a multi-cloud
EC Lopez-Falcon, V Miranda-López… - Latin American High …, 2018 - Springer
Security issues related to cloud computing as well as all solutions proposed in the literature
are one of the high topics for research. However, there are many unsolved problems …
are one of the high topics for research. However, there are many unsolved problems …
Transferring state in content centric network stacks
I Solis - US Patent 9,986,034, 2018 - Google Patents
One embodiment of the present invention provides a system that facilitates the transfer of the
state of a stack in a content centric network. During operation, the system receives, by a …
state of a stack in a content centric network. During operation, the system receives, by a …
A Source Hiding Identity‐Based Proxy Reencryption Scheme for Wireless Sensor Network
C Ge, J Xia, A Wu, H Li, Y Wang - Security and Communication …, 2018 - Wiley Online Library
Wireless sensor network (WSN), which extends the typical Internet environment to Internet of
Things, has been deployed in various environments such as safety monitoring, intelligent …
Things, has been deployed in various environments such as safety monitoring, intelligent …
Order encoded manifests in a content centric network
One embodiment provides a system that facilitates direct seeking of the ordered content of a
manifest based on external metadata. During operation, the system determines, by a content …
manifest based on external metadata. During operation, the system determines, by a content …
A new insight—proxy re-encryption under LWE with strong anti-collusion
W Yin, Q Wen, W Li, H Zhang, Z Jin - Information Security Practice and …, 2018 - Springer
Proxy re-encryption is a special type of public key encryption that allows an intermediate
proxy to transform a ciphertext from one public key to another without learning any …
proxy to transform a ciphertext from one public key to another without learning any …
StackSync: Attribute‐based data sharing in file synchronization services
M Sánchez‐Artigas, C Cotes… - Concurrency and …, 2018 - Wiley Online Library
Personal Cloud (PC) storage services such as Dropbox or Google Drive have become
increasingly popular in the last few years. Unfortunately, these services are still not secure …
increasingly popular in the last few years. Unfortunately, these services are still not secure …
Secure proxy-reencryption-based inter-network key exchange
L Greenwald, K Rohloff, D Stott - MILCOM 2018-2018 IEEE …, 2018 - ieeexplore.ieee.org
In this paper we present a novel approach to distribute session keys securely across
administrative boundaries where participants may be unable to interact directly. The basis of …
administrative boundaries where participants may be unable to interact directly. The basis of …
An efficient traceable data sharing scheme in cloud computing for mobile devices
Owing to the convenience of mobile devices and the advantages of cloud computing, it is a
fashion to efficiently share data by mobile devices in cloud computing. However, it might be …
fashion to efficiently share data by mobile devices in cloud computing. However, it might be …