Securing Intelligent Vehicles: Authentication and Bilateral Control via Inner Product Matchmaking Encryption

Z Peng, C Peng, Y Tian, H Ding - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The intelligent vehicle manufacturing industry is flourishing, but its large-scale adoption and
application require not only ensuring driving safety and high-quality service but also …

Trusted edge and cross-domain privacy enhancement model under multi-blockchain

H Minmin, Y Lingyun, P Xue, Z Chuan - Computer Networks, 2023 - Elsevier
With its promising security and distributed qualities, blockchain offers a significant
opportunity to break through the privacy protection issues in the edge computing paradigm …

Expressive Access Control Encryption With Bilateral Policy Privacy for Consumer Electronics in the Metaverse

Z Peng, C Peng, D Xu, H Ding - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The metaverse offers an unprecedented immersive experience and a fresh connection
paradigm for consumers, which brings security threats related to unauthorized data access …

Revocable identity‐based matchmaking encryption in the standard model

Z Jiang, X Wang, K Zhang, J Gong… - IET Information …, 2023 - Wiley Online Library
Abstract Identity‐based Matchmaking Encryption (IB‐ME) is an extension notion of
matchmaking encryption (CRYPTO 2019), where a sender and a receiver can specify an …

Cross-Domain Bilateral Access Control on Blockchain-Cloud Based Data Trading System.

Y Park, SJ Shin, SU Shin - CMES-Computer Modeling in …, 2024 - search.ebscohost.com
Data trading enables data owners and data requesters to sell and purchase data. With the
emergence of blockchain technology, research on blockchain-based data trading systems is …

Deniable Identity-Based Matchmaking Encryption for Anonymous Messaging

Y Cao, J Wei, X Huang, X Chen… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Anonymous messaging system allows users to deliver messages without revealing the
sending content and their identifiers, which has attracted ongoing concerns. However, to the …

Post-Quantum Secure Identity-Based Matchmaking Encryption

H Wang, K Chen, Q Xie, Q Meng - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Matchmaking encryption constructed in the identity-based encryption setting, named identity-
based matchmaking encryption (IB-ME), requires both sender and receiver to specify target …

Enabling Privacy-Preserving Data Sharing with Bilateral Access Control for Cloud

T Wu, X Ma, H Yan - Electronics, 2023 - mdpi.com
Cloud computing plays an essential role in various fields. However, the existing cloud
services face a severe challenge, which is how to share the data among a large scale of …

Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control

X Wang, K Zhang, J Li, M Wen, S Xu… - The Computer …, 2024 - academic.oup.com
Searchable asymmetric encryption (SAE) enables a client to search over a data owner's
encrypted data. Nevertheless, state-of-the-art SAE schemes allow a data owner to specify …

Trusted Edge and Cross-Domain Privacy Enhancement Solutions Under Multi-Blockchain

Y Lingyun, P Xue - papers.ssrn.com
Blockchain offers significant opportunities to solve the privacy protection issues in the edge
computing paradigm through its promising security and distributed qualities. This paper …