User-friendly public-key authenticated encryption with keyword search for industrial internet of things

L Pu, C Lin, B Chen, D He - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) incorporates massive physical devices to collect
ambient data. Due to the limited types of equipment in IIoT, most of the data has to be saved …

A secure and efficient certificateless authenticated key agreement protocol for smart healthcare

Y Ma, Y Ma, Y Liu, Q Cheng - Computer Standards & Interfaces, 2023 - Elsevier
As more and more important smart healthcare becomes in people's daily life, its security
issues draw increasing attention. It is stringent to design trusty communication protocol …

A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment

VB Chenam, ST Ali - Journal of Information Security and Applications, 2023 - Elsevier
One of the essential technologies in the medical industry for achieving high performance
and accuracy is the Medical Internet of Things (MIoT). The MIoT technology processes a …

Forward secure public-key authenticated encryption with conjunctive keyword search

Z Jiang, K Zhang, L Wang, J Ning - The Computer Journal, 2023 - academic.oup.com
Public key encryption with keyword search is a promising primitive which enables search
over encrypted data in secure data outsourcing services. In traditional construction, the …

A certificateless authenticated searchable encryption with dynamic multi-receiver for cloud storage

VB Chenam, ST Ali - Computer Communications, 2023 - Elsevier
The searchable encryption schemes (PEKS, IBEKS, and CLPEKS) based on public-key
cryptography (ie, PKI-based, Identity-based, and Certificateless) enable the data users to …

Certificateless public key authenticated searchable encryption with enhanced security model in IIoT applications

L Cheng, F Meng - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
In Industrial Internet of Things, powerful cloud servers are needed to process substantial
sensitive industrial data, which should be encrypted before being uploaded to the cloud. To …

[PDF][PDF] An efficient reconfigurable cryptographic model for dynamic and secure unstructured data sharing in multi-cloud storage server

PMB Muddumadappa, SDK Anjanappa… - J. Intell Syst …, 2022 - academia.edu
This study designs a reconfigurable multi-cloud storage server architecture for dynamic and
secure data sharing has been designed, improves the security of unstructured data using …

A provably secure free-pairing certificateless searchable encryption scheme

MR Senouci, I Benkhaddra, A Senouci, F Li - Telecommunication Systems, 2022 - Springer
The protection of user data and privacy is becoming more critical because they mainly come
from different sources, such as the Internet of Things. The searchable encryption (SE) …

Privacy-preserving and forward public key encryption with field-free multi-keyword search for cloud encrypted data

Y Lu, J Li - IEEE Transactions on Cloud Computing, 2023 - ieeexplore.ieee.org
With the excessive growth of data and the rapid development of cloud technology, cloud
adoption is expanding rapidly nowadays. To achieve the purpose of privacy protection, the …

Key-aggregate based access control encryption for flexible cloud data sharing

J Liu, J Qin, W Wang, L Mei, H Wang - Computer Standards & Interfaces, 2024 - Elsevier
Cloud computing has become the priority for users to store and share data due to its
numerous tempting advantages. The “encryption-before-outsourcing” mechanism is …