Realizing an internet of secure things: A survey on issues and enabling technologies

SA Hamad, QZ Sheng, WE Zhang… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …

Secure attribute-based data sharing for resource-limited users in cloud computing

J Li, Y Zhang, X Chen, Y Xiang - Computers & Security, 2018 - Elsevier
Data sharing becomes an exceptionally attractive service supplied by cloud computing
platforms because of its convenience and economy. As a potential technique for realizing …

Securely outsourcing attribute-based encryption with checkability

J Li, X Huang, J Li, X Chen… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Attribute-Based Encryption (ABE) is a promising cryptographic primitive which significantly
enhances the versatility of access control mechanisms. Due to the high expressiveness of …

New publicly verifiable databases with efficient updates

X Chen, J Li, X Huang, J Ma… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
The notion of verifiable database (VDB) enables a resource-constrained client to securely
outsource a very large database to an untrusted server so that it could later retrieve a …

Secure and fine-grained access control on e-healthcare records in mobile cloud computing

Y Liu, Y Zhang, J Ling, Z Liu - Future Generation Computer Systems, 2018 - Elsevier
In the era of Internet of things, wearable devices can be used to monitor residents' health
and upload collected health data to cloud servers for sharing, which facilitates the …

Secure outsourced attribute-based signatures

X Chen, J Li, X Huang, J Li, Y Xiang… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Attribute-based signature (ABS) enables users to sign messages over attributes without
revealing any information other than the fact that they have attested to the messages …

Outsourcing encryption of attribute-based encryption with mapreduce

J Li, C Jia, J Li, X Chen - … 14th International Conference, ICICS 2012, Hong …, 2012 - Springer
Attribute-based encryption (ABE) is a promising cryptographic tool for fine-grained access
control. However, the computational cost in encryption commonly grows with the complexity …

Server-aided anonymous attribute-based authentication in cloud computing

Z Liu, H Yan, Z Li - Future Generation Computer Systems, 2015 - Elsevier
The notion of attribute-based signature is one of the important security primitives to realize
anonymous authentication. In an attribute based signature (ABS), users can generate a …

Chariot: Cloud-assisted access control for the internet of things

C Gritti, M Önen, R Molva - … on Privacy, Security and Trust (PST …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) technology has ex-panded widely across the world, promising
new data management opportunities for industries, companies and individuals in different …

A blockchain-assisted hash-based signature scheme

A Buldas, R Laanoja, A Truu - Secure IT Systems: 23rd Nordic Conference …, 2018 - Springer
We present a server-supported, hash-based digital signature scheme. To achieve greater
efficiency than current state of the art, we relax the security model somewhat. We postulate a …