Fine-grained and controlled rewriting in blockchains: Chameleon-hashing gone attribute-based

D Derler, K Samelin, D Slamanig… - Cryptology ePrint …, 2019 - eprint.iacr.org
Blockchain technologies recently received a considerable amount of attention. While the
initial focus was mainly on the use of blockchains in the context of cryptocurrencies such as …

Match in my way: Fine-grained bilateral access control for secure cloud-fog computing

S Xu, J Ning, Y Li, Y Zhang, G Xu… - … on Dependable and …, 2020 - ieeexplore.ieee.org
Cloud-fog computing is a novel paradigm to extend the functionality of cloud computing to
provide a variety of on-demand data services via the edge network. Many cryptographic …

Structure-preserving signatures on equivalence classes and constant-size anonymous credentials

G Fuchsbauer, C Hanser, D Slamanig - Journal of Cryptology, 2019 - Springer
Abstract Structure-preserving signatures (SPS) are a powerful building block for
cryptographic protocols. We introduce SPS on equivalence classes (SPS-EQ), which allow …

Server-aided bilateral access control for secure data sharing with dynamic user groups

S Xu, J Ning, X Huang, J Zhou… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
As a versatile technique, cloud-fog computing extends the traditional cloud server to offer
various on-demand data services. Maintaining data confidentiality is one of the most crucial …

Verifiable outsourced attribute-based encryption scheme for cloud-assisted mobile e-health system

Y Miao, F Li, X Li, J Ning, H Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The cloud-assisted mobile electronic health (e-health) system facilitates e-health data
sharing between healthcare providers and patients, but also raises the security and privacy …

Match me if you can: Matchmaking encryption and its applications

G Ateniese, D Francati, D Nunez, D Venturi - Advances in Cryptology …, 2019 - Springer
We introduce a new form of encryption that we name matchmaking encryption (ME). Using
ME, sender S and receiver R (each with its own attributes) can both specify policies the other …

A practical and efficient bidirectional access control scheme for cloud-edge data sharing

J Cui, B Li, H Zhong, G Min, Y Xu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The cloud computing paradigm provides numerous tempting advantages, enabling users to
store and share their data conveniently. However, users are naturally resistant to directly …

Achieving fuzzy matching data sharing for secure cloud-edge communication

C Zhang, M Zhao, Y Xu, T Wu, Y Li, L Zhu… - China …, 2022 - ieeexplore.ieee.org
In this paper, we propose a novel fuzzy matching data sharing scheme named FADS for
cloud-edge communications. FADS allows users to specify their access policies, and …

Expressive bilateral access control for internet-of-things in cloud-fog computing

S Xu, J Ning, J Ma, X Huang, HH Pang… - Proceedings of the 26th …, 2021 - dl.acm.org
As a versatile system architecture, cloud-fog Internet-of-Things~(IoT) enables multiple
resource-constrained devices to communicate and collaborate with each other. By …

GroupIt: Lightweight group key management for dynamic IoT environments

YH Kung, HC Hsiao - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
With the proliferation of Internet of Things (IoT) devices that collect sensitive data, access
control is more crucial than ever to safeguard IoT data from unauthorized use. To enforce …