Privacy-preserving proxy re-encryption with decentralized trust management for mec-empowered vanets

X Han, D Tian, J Zhou, X Duan, Z Sheng… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Multi-access edge computing (MEC) technology is widely deployed at the edge of Vehicular
Ad hoc Networks (VANETs) to enhance their communication and computational capabilities …

Identity-based broadcast proxy re-encryption for flexible data sharing in VANETs

J Zhang, S Su, H Zhong, J Cui… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Data sharing is an integral part of vehicular ad hoc networks (VANETs), which provide
drivers with safe and comfortable driving environments. However, when data are shared …

A blockchain-based proxy re-encryption with equality test for vehicular communication systems

B Chen, D He, N Kumar, H Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Vehicular communication systems (VCS) are likely to play an increasingly important role in
future smart city design, for example by improving road safety and traffic efficiency. However …

Vehicular Edge Computing Meets Cache: An Access Control Scheme With Fair Incentives for Privacy-Aware Content Delivery

S Jiang, J Li, G Sang, H Wu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Vehicular Edge Computing (VEC) integrates mobile edge computing with traditional
vehicular networks, which shifts the majority of computation and storage workload of …

Strongly secure and cost-effective certificateless proxy re-encryption scheme for data sharing in cloud computing

Z Qin, S Wu, H Xiong - Big Data Computing and Communications: First …, 2015 - Springer
Proxy re-encryption (PRE) has been considered as a promising candidate to secure data
sharing in public cloud by enabling the cloud to transform the ciphertext to legitimate …

Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing

L Yan, H Qin, K Yang, H Xie, XA Wang, S Liu - Electronics, 2024 - mdpi.com
The popularity of secure cloud data sharing is on the rise, but it also comes with significant
concerns about privacy violations and data tampering. While existing Proxy Re-Encryption …

A Multilevel Electronic Control Unit Re-Encryption Scheme for Autonomous Vehicles

J Cui, Y Shen, H Zhong, J Zhang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Electronic control units (ECUs) connected by a controller area network (CAN) are used to
perform various functions in modern vehicles. In the latest autonomous vehicles, redundant …

Privacy-preserving and efficient sharing of drone videos in public safety scenarios using proxy re-encryption

K Rabieh, S Mercan, K Akkaya… - 2020 IEEE 21st …, 2020 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs) also known as drones are being used in many
applications where they can record or stream videos. One interesting application is the …

Revocable identity-based broadcast proxy re-encryption for data sharing in clouds

C Ge, Z Liu, J Xia, L Fang - IEEE transactions on dependable …, 2019 - ieeexplore.ieee.org
Cloud computing has become prevalent due to its nature of massive storage and vast
computing capabilities. Ensuring a secure data sharing is critical to cloud applications …

Efficient and adaptively secure attribute-based proxy reencryption scheme

H Li, L Pang - International Journal of Distributed Sensor …, 2016 - journals.sagepub.com
Ciphertext-Policy Attribute-Based Proxy Reencryption (CP-ABPRE) has found many
practical applications in the real world, because it extends the traditional Proxy Reencryption …