An identity-based proxy re-encryption scheme with single-hop conditional delegation and multi-hop ciphertext evolution for secure cloud data sharing

S Yao, RVJ Dayot, IH Ra, L Xu, Z Mei… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Proxy re-encryption (PRE) provides a promising solution for applications requiring efficient
and secure ciphertext conversion, such as secure cloud data sharing. While the one with the …

Low energy interleaved chaotic secure image coding scheme for visual sensor networks using pascal's triangle transform

G Suseela, YAV Phamila, G Niranjana… - IEEE …, 2021 - ieeexplore.ieee.org
The resource-constrained camera integrated Visual Sensor Networks (VSN) have
conquered numerous visual aided services from visual surveillance to habitat monitoring …

The Cross-Domain Identity Authentication Scheme Has no Trusted Authentication Center in the Cloud Environment

M Zhang, J Mao, Z Dai, Y Li, M Zhang, L Fan… - Advances in Artificial …, 2021 - Springer
This paper analyzes the existing problems of cross-domain authentication models and
proposes a new cross-domain authentication model because there is no trusted …

An Authentication Mechanism for IoT Devices Based on Traceable and Revocable Identity-Based Encryption

F Xia, J Mao, Z Shao, L Xu, R Zhao, Y Yang - Artificial Intelligence and …, 2021 - Springer
To solve low computing efficiency and high computational energy consumption in the
traditional Public-key Infrastructure cryptosystem in the authentication of IoT devices, an …