[HTML][HTML] A review of functional encryption in IoT applications

K Shahzad, T Zia, EH Qazi - Sensors, 2022 - mdpi.com
The Internet of Things (IoT) represents a growing aspect of how entities, including humans
and organizations, are likely to connect with others in their public and private interactions …

An efficient file hierarchy attribute-based encryption scheme in cloud computing

S Wang, J Zhou, JK Liu, J Yu, J Chen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption
technology to solve the challenging problem of secure data sharing in cloud computing. The …

Secure keyword search and data sharing mechanism for cloud computing

C Ge, W Susilo, Z Liu, J Xia… - … on Dependable and …, 2020 - ieeexplore.ieee.org
The emergence of cloud infrastructure has significantly reduced the costs of hardware and
software resources in computing infrastructure. To ensure security, the data is usually …

Searchable attribute-based mechanism with efficient data sharing for secure cloud storage

K Liang, W Susilo - IEEE Transactions on Information Forensics …, 2015 - ieeexplore.ieee.org
To date, the growth of electronic personal data leads to a trend that data owners prefer to
remotely outsource their data to clouds for the enjoyment of the high-quality retrieval and …

Secure sharing of big digital twin data for smart manufacturing based on blockchain

W Shen, T Hu, C Zhang, S Ma - Journal of manufacturing systems, 2021 - Elsevier
With the rapid development of digital twin technology, a large amount of digital twin data
named as big digital twin data (BDTD), is generated in the lifecycle of equipment, which is …

Identity-based encryption transformation for flexible sharing of encrypted data in public cloud

H Deng, Z Qin, Q Wu, Z Guan, RH Deng… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
With the rapid development of cloud computing, an increasing number of individuals and
organizations are sharing data in the public cloud. To protect the privacy of data stored in the …

Attribute-based data sharing scheme revisited in cloud computing

S Wang, K Liang, JK Liu, J Chen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) is a very promising encryption
technique for secure data sharing in the context of cloud computing. Data owner is allowed …

An efficient non-interactive multi-client searchable encryption with support for boolean queries

SF Sun, JK Liu, A Sakzad, R Steinfeld… - … Security–ESORICS 2016 …, 2016 - Springer
Motivated by the recent searchable symmetric encryption protocol of Cash et al., we propose
a new multi-client searchable encryption protocol in this work. By tactfully leveraging the …

Privacy-preserving personal data operation on mobile cloud—Chances and challenges over advanced persistent threat

MH Au, K Liang, JK Liu, R Lu, J Ning - Future Generation Computer …, 2018 - Elsevier
Bring your own devices have become a new symbol of industrial and education institutional
culture to date. A single individual can gain access to personal data anytime at anywhere of …

Conditional identity-based broadcast proxy re-encryption and its application to cloud email

P Xu, T Jiao, Q Wu, W Wang… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Recently, a number of extended Proxy Re-Encryptions (PRE), eg Conditional (CPRE),
identity-based PRE (IPRE) and broadcast PRE (BPRE), have been proposed for flexible …