With the growth of the urban population, the rapid development of smart cities has become the focus of urban regional development. Smart medical care is an indispensable part of …
Z Zhao, W Susilo, B Wang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Public-key encryption with equality test (PKEET) provides cloud servers with an effective way to check the equality of outsourced encrypted data without decryption. This enables …
T Liu, Y Miao, KKR Choo, H Li, X Liu… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices and systems are becoming increasingly commonplace, and as such systems scale up, so do the computational and storage requirements. Hence, one …
In the cloud, uploading encrypted data is the most effective way to ensure that the data are not leaked. However, data access control is still an open problem in cloud storage systems …
M Zeng, J Chen, K Zhang, H Qian - Theoretical Computer Science, 2019 - Elsevier
Public key encryption with equality test (PKEET) allows a tester to know whether ciphertexts are the encryptions of a same message or not by using the trapdoors issued from their …
M Zamani, M Safkhani, N Daneshpour… - Wireless Personal …, 2021 - Springer
Searchable encryption schemes allow documents' owners to store their encrypted documents on servers, search for the desired keyword and then download only the desired …
Cloud computing is a technology which has enabled many organizations to outsource their data in an encrypted form to improve processing times. The public Internet was not initially …
H Zhu, L Wang, H Ahmad, D Xie - IEEE Access, 2021 - ieeexplore.ieee.org
The modular exponentiation has been proved better in terms of computational efficiency as compared to bilinear pairing. Therefore, discrete logarithm, a concept of modular …
We propose a new secure equality testing (SET) protocol, namely SET-OT, for two-party setting by using a recently introduced Private Set Membership Protocol (PSM) based on …