Secure Data Sharing in Cloud Computing: A Comprehensive Survey of Two-Factor Authentication and Cryptographic Solutions.

S Gadde, GS Rao, VS Veesam… - … des Systèmes d' …, 2023 - search.ebscohost.com
Cloud computing has emerged as a pivotal trend across both commercial and academic
sectors, offering substantial storage capabilities to service providers and end-users …

Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments

H Xiong, Q Mei, Y Zhao - IEEE Systems Journal, 2019 - ieeexplore.ieee.org
With the continuous development of the industrial Internet of Things (IIoT), many
organizations opt for storing the data collected by smart devices on a cloud server for saving …

Two-factor data security protection mechanism for cloud storage system

JK Liu, K Liang, W Susilo, J Liu… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we propose a two-factor data security protection mechanism with factor
revocability for cloud storage system. Our system allows a sender to send an encrypted …

Certificateless Key‐Insulated Generalized Signcryption Scheme without Bilinear Pairings

C Zhou, Z Zhao, W Zhou, Y Mei - Security and Communication …, 2017 - Wiley Online Library
Generalized signcryption (GSC) can be applied as an encryption scheme, a signature
scheme, or a signcryption scheme with only one algorithm and one key pair. A key‐insulated …

Fine-grained two-factor protection mechanism for data sharing in cloud storage

C Zuo, J Shao, JK Liu, G Wei… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Data sharing in cloud storage is receiving substantial attention in information
communications technology because it can provide users with efficient and effective storage …

Parallel key-insulated multiuser searchable encryption for industrial Internet of Things

J Cui, J Lu, H Zhong, Q Zhang, C Gu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the rapid development of the industrial Internet of Things (IIoT) and cloud computing, an
increasing number of companies outsource their data to cloud servers to save costs. To …

An efficient V2I authentication scheme for VANETs

Y Zhou, S Liu, M Xiao, S Deng… - Mobile Information …, 2018 - Wiley Online Library
The advent of intelligent transportation system has a crucial impact on the traffic safety and
efficiency. To cope with security issues such as spoofing attack and forgery attack, many …

Certificate-based parallel key-insulated aggregate signature against fully chosen key attacks for industrial Internet of Things

Y Hou, H Xiong, X Huang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
With the emergence of the Industrial Internet of Things (IIoT), numerous operations based on
smart devices contribute to producing the convenience and comfortable applications for …

[PDF][PDF] A Lightweight Certificate-Based Aggregate Signature Scheme Providing Key Insulation.

YW Hwang, Y Lee - Computers, Materials & Continua, 2021 - cdn.techscience.cn
Recently, with the advancement of Information and Communications Technology (ICT),
Internet of Things (IoT) has been connected to the cloud and used in industrial sectors …

Parallel key-insulated public key encryption without random oracles

B Libert, JJ Quisquater, M Yung - … Conference on Practice and Theory in …, 2007 - Springer
Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen
the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently introduced the …