Fine-grained and controlled rewriting in blockchains: Chameleon-hashing gone attribute-based
Blockchain technologies recently received a considerable amount of attention. While the
initial focus was mainly on the use of blockchains in the context of cryptocurrencies such as …
initial focus was mainly on the use of blockchains in the context of cryptocurrencies such as …
Match in my way: Fine-grained bilateral access control for secure cloud-fog computing
Cloud-fog computing is a novel paradigm to extend the functionality of cloud computing to
provide a variety of on-demand data services via the edge network. Many cryptographic …
provide a variety of on-demand data services via the edge network. Many cryptographic …
Structure-preserving signatures on equivalence classes and constant-size anonymous credentials
Abstract Structure-preserving signatures (SPS) are a powerful building block for
cryptographic protocols. We introduce SPS on equivalence classes (SPS-EQ), which allow …
cryptographic protocols. We introduce SPS on equivalence classes (SPS-EQ), which allow …
Server-aided bilateral access control for secure data sharing with dynamic user groups
As a versatile technique, cloud-fog computing extends the traditional cloud server to offer
various on-demand data services. Maintaining data confidentiality is one of the most crucial …
various on-demand data services. Maintaining data confidentiality is one of the most crucial …
Verifiable outsourced attribute-based encryption scheme for cloud-assisted mobile e-health system
The cloud-assisted mobile electronic health (e-health) system facilitates e-health data
sharing between healthcare providers and patients, but also raises the security and privacy …
sharing between healthcare providers and patients, but also raises the security and privacy …
Match me if you can: Matchmaking encryption and its applications
We introduce a new form of encryption that we name matchmaking encryption (ME). Using
ME, sender S and receiver R (each with its own attributes) can both specify policies the other …
ME, sender S and receiver R (each with its own attributes) can both specify policies the other …
A practical and efficient bidirectional access control scheme for cloud-edge data sharing
The cloud computing paradigm provides numerous tempting advantages, enabling users to
store and share their data conveniently. However, users are naturally resistant to directly …
store and share their data conveniently. However, users are naturally resistant to directly …
Achieving fuzzy matching data sharing for secure cloud-edge communication
In this paper, we propose a novel fuzzy matching data sharing scheme named FADS for
cloud-edge communications. FADS allows users to specify their access policies, and …
cloud-edge communications. FADS allows users to specify their access policies, and …
Expressive bilateral access control for internet-of-things in cloud-fog computing
As a versatile system architecture, cloud-fog Internet-of-Things~(IoT) enables multiple
resource-constrained devices to communicate and collaborate with each other. By …
resource-constrained devices to communicate and collaborate with each other. By …
GroupIt: Lightweight group key management for dynamic IoT environments
With the proliferation of Internet of Things (IoT) devices that collect sensitive data, access
control is more crucial than ever to safeguard IoT data from unauthorized use. To enforce …
control is more crucial than ever to safeguard IoT data from unauthorized use. To enforce …