Conjunctive keyword search with designated tester and timing enabled proxy re-encryption function for e-health clouds

Y Yang, M Ma - IEEE Transactions on Information Forensics …, 2015 - ieeexplore.ieee.org
An electronic health (e-health) record system is a novel application that will bring great
convenience in healthcare. The privacy and security of the sensitive personal information …

A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security

K Liang, L Fang, W Susilo… - 2013 5th international …, 2013 - ieeexplore.ieee.org
Cipher text-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE) extends the traditional
Proxy Re-Encryption (PRE) by allowing a semi-trusted proxy to transform a cipher text under …

A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing

K Liang, MH Au, JK Liu, W Susilo, DS Wong… - Future Generation …, 2015 - Elsevier
Abstract Proxy Re-Encryption (PRE) is a useful cryptographic primitive that allows a data
owner to delegate the access rights of the encrypted data stored on a cloud storage system …

Secure and temporary access delegation with equality test for cloud-assisted IoV

W Li, C Xia, C Wang, T Wang - IEEE Transactions on Intelligent …, 2022 - ieeexplore.ieee.org
With the continuous development of the Internet of Vehicles (IoV), the cloud-assisted IoV is
becoming an emerging and attractive paradigm, in which a growing number of IoV users use …

Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things

L Xu, J Li, X Chen, W Li, S Tang, HT Wu - Journal of Network and Computer …, 2019 - Elsevier
With the widespread adoption of Internet of Things (IoT) and cloud computing, more and
more individuals and organizations are outsourcing their IoT data in the cloud server. Under …

A conditional proxy broadcast re-encryption scheme supporting timed-release

K Liang, Q Huang, R Schlegel, DS Wong… - … Security Practice and …, 2013 - Springer
To allow a delegator not only to delegate the keywordcontrolled decryption rights of a
broadcast encryption to a set of specified recipients, but also to control when the decryption …

Time‐enabled and verifiable secure search for blockchain‐empowered electronic health record sharing in IoT

X Nie, A Zhang, J Chen, Y Qu… - Security and …, 2022 - Wiley Online Library
The collection and sharing of electronic health records (EHRs) via the Internet of Things
(IoT) can enhance the accuracy of disease diagnosis. However, it is challenging to …

Authorized keyword searches on public key encrypted data with time controlled keyword privacy

L Xu, W Li, F Zhang, R Cheng… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Recently, more and more data have been stored in the cloud with keyword indices so that
the data users can make search over the databases. In some of these database …

Verifiable and Searchable Symmetric Encryption Scheme Based on the Public Key Cryptosystem

G Duan, S Li - Electronics, 2023 - mdpi.com
With the rapid development of Internet of Things technology and cloud computing
technology, all industries need to outsource massive data to third-party clouds for storage in …

A ciphertext‐policy attribute‐based proxy re‐encryption scheme for data sharing in public clouds

K Liang, L Fang, DS Wong… - … and Computation: Practice …, 2015 - Wiley Online Library
Ciphertext‐policy attribute‐based proxy re‐encryption (CP‐ABPRE) extends the traditional
Proxy Re‐Encryption (PRE) by allowing a semi‐trusted proxy to transform a ciphertext under …