Identity-based data outsourcing with comprehensive auditing in clouds

Y Wang, Q Wu, B Qin, W Shi… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
Cloud storage system provides facilitative file storage and sharing services for distributed
clients. To address integrity, controllable outsourcing, and origin auditing concerns on …

Efficient delegated private set intersection on outsourced private datasets

A Abadi, S Terzis, R Metere… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Private set intersection (PSI) is an essential cryptographic protocol that has many real world
applications. As cloud computing power and popularity have been swiftly growing, it is now …

A position-aware Merkle tree for dynamic cloud data integrity verification

J Mao, Y Zhang, P Li, T Li, Q Wu, J Liu - Soft Computing, 2017 - Springer
In the cloud storage framework, once clients remotely store their data on cloud storage
providers, they will lose the physical control over their outsourced data. The risk of …

An efficient ABE scheme with verifiable outsourced encryption and decryption

Z Li, W Li, Z Jin, H Zhang, Q Wen - IEEE Access, 2019 - ieeexplore.ieee.org
Attribute-based encryption (ABE) is a promising cryptographic tool for data owner (DO) to
realize fine-grained date sharing in the cloud computing. In the encryption of most existing …

Privacy-preserving and distributed algorithms for modular exponentiation in IoT with edge computing assistance

H Li, J Yu, H Zhang, M Yang… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the development of Internet of Things (IoT) and 5G, edge computing, as a new
computing paradigm, has been widely popularized in academia and industry. Due to the …

Privacy-preserving face recognition with outsourced computation

C Xiang, C Tang, Y Cai, Q Xu - Soft Computing, 2016 - Springer
Face recognition is one of the most important biometrics pattern recognitions, which has
been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of …

Online/offline provable data possession

Y Wang, Q Wu, B Qin, S Tang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Provable data possession (PDP) allows a user to outsource data with a guarantee that the
integrity can be efficiently verified. Existing publicly verifiable PDP schemes require the user …

Practical and secure outsourcing algorithms for solving quadratic congruences in internet of things

H Zhang, J Yu, C Tian, G Xu, P Gao… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Solving quadratic congruences is a widely applied operation in cryptographic protocols to
ensure the data secrecy in the Internet of Things (IoT). Yet it requires unaffordable …

ExpSOS: Secure and verifiable outsourcing of exponentiation operations for mobile cloud computing

K Zhou, MH Afifi, J Ren - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
Discrete exponential operation, such as modular exponentiation and scalar multiplication on
elliptic curves, is a basic operation of many public-key cryptosystems. However, the …

Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions

C Chevalier, F Laguillaumie, D Vergnaud - Algorithmica, 2021 - Springer
We address the problem of speeding up group computations in cryptography using a single
untrusted computational resource. We analyze the security of two efficient protocols for …