Identity-based data outsourcing with comprehensive auditing in clouds
Y Wang, Q Wu, B Qin, W Shi… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
Cloud storage system provides facilitative file storage and sharing services for distributed
clients. To address integrity, controllable outsourcing, and origin auditing concerns on …
clients. To address integrity, controllable outsourcing, and origin auditing concerns on …
Efficient delegated private set intersection on outsourced private datasets
Private set intersection (PSI) is an essential cryptographic protocol that has many real world
applications. As cloud computing power and popularity have been swiftly growing, it is now …
applications. As cloud computing power and popularity have been swiftly growing, it is now …
A position-aware Merkle tree for dynamic cloud data integrity verification
J Mao, Y Zhang, P Li, T Li, Q Wu, J Liu - Soft Computing, 2017 - Springer
In the cloud storage framework, once clients remotely store their data on cloud storage
providers, they will lose the physical control over their outsourced data. The risk of …
providers, they will lose the physical control over their outsourced data. The risk of …
An efficient ABE scheme with verifiable outsourced encryption and decryption
Z Li, W Li, Z Jin, H Zhang, Q Wen - IEEE Access, 2019 - ieeexplore.ieee.org
Attribute-based encryption (ABE) is a promising cryptographic tool for data owner (DO) to
realize fine-grained date sharing in the cloud computing. In the encryption of most existing …
realize fine-grained date sharing in the cloud computing. In the encryption of most existing …
Privacy-preserving and distributed algorithms for modular exponentiation in IoT with edge computing assistance
With the development of Internet of Things (IoT) and 5G, edge computing, as a new
computing paradigm, has been widely popularized in academia and industry. Due to the …
computing paradigm, has been widely popularized in academia and industry. Due to the …
Privacy-preserving face recognition with outsourced computation
C Xiang, C Tang, Y Cai, Q Xu - Soft Computing, 2016 - Springer
Face recognition is one of the most important biometrics pattern recognitions, which has
been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of …
been widely applied in a variety of enterprise, civilian and law enforcement. The privacy of …
Online/offline provable data possession
Y Wang, Q Wu, B Qin, S Tang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Provable data possession (PDP) allows a user to outsource data with a guarantee that the
integrity can be efficiently verified. Existing publicly verifiable PDP schemes require the user …
integrity can be efficiently verified. Existing publicly verifiable PDP schemes require the user …
Practical and secure outsourcing algorithms for solving quadratic congruences in internet of things
Solving quadratic congruences is a widely applied operation in cryptographic protocols to
ensure the data secrecy in the Internet of Things (IoT). Yet it requires unaffordable …
ensure the data secrecy in the Internet of Things (IoT). Yet it requires unaffordable …
ExpSOS: Secure and verifiable outsourcing of exponentiation operations for mobile cloud computing
Discrete exponential operation, such as modular exponentiation and scalar multiplication on
elliptic curves, is a basic operation of many public-key cryptosystems. However, the …
elliptic curves, is a basic operation of many public-key cryptosystems. However, the …
Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions
C Chevalier, F Laguillaumie, D Vergnaud - Algorithmica, 2021 - Springer
We address the problem of speeding up group computations in cryptography using a single
untrusted computational resource. We analyze the security of two efficient protocols for …
untrusted computational resource. We analyze the security of two efficient protocols for …