Current status and security trend of osint

YW Hwang, IY Lee, H Kim, H Lee… - … and Mobile Computing, 2022 - Wiley Online Library
Recently, users have used open‐source intelligence (OSINT) to gather and obtain
information regarding the data of interest. The advantage of using data gathered by OSINT is …

Proxy re-encryption: Analysis of constructions and its application to secure access delegation

D Nuñez, I Agudo, J Lopez - Journal of Network and Computer Applications, 2017 - Elsevier
This paper analyzes the secure access delegation problem, which occurs naturally in the
cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from …

Revocable identity-based broadcast proxy re-encryption for data sharing in clouds

C Ge, Z Liu, J Xia, L Fang - IEEE transactions on dependable …, 2019 - ieeexplore.ieee.org
Cloud computing has become prevalent due to its nature of massive storage and vast
computing capabilities. Ensuring a secure data sharing is critical to cloud applications …

Key-aggregate cryptosystem for scalable data sharing in cloud storage

CK Chu, SSM Chow, WG Tzeng… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Data sharing is an important functionality in cloud storage. In this paper, we show how to
securely, efficiently, and flexibly share data with others in cloud storage. We describe new …

Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid

Z Guan, J Li, L Wu, Y Zhang, J Wu… - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
Cloud-supported Internet of Things (Cloud-IoT) has been broadly deployed in smart grid
systems. The IoT front-ends are responsible for data acquisition and status supervision …

A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security

K Liang, L Fang, W Susilo… - 2013 5th international …, 2013 - ieeexplore.ieee.org
Cipher text-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE) extends the traditional
Proxy Re-Encryption (PRE) by allowing a semi-trusted proxy to transform a cipher text under …

Efficient unidirectional proxy re-encryption

SSM Chow, J Weng, Y Yang, RH Deng - … , South Africa, May 3-6, 2010 …, 2010 - Springer
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally
intended for Alice into one encrypting the same plaintext for Bob. The proxy only needs a re …

CCA-secure proxy re-encryption without pairings

J Shao, Z Cao - International Workshop on Public Key Cryptography, 2009 - Springer
In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under
Alice's public key into another ciphertext that Bob can decrypt. However, the proxy cannot …

Unidirectional chosen-ciphertext secure proxy re-encryption

B Libert, D Vergnaud - Public Key Cryptography–PKC 2008: 11th …, 2008 - Springer
Abstract In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called
proxy re-encryption, in which a proxy transforms–without seeing the corresponding plaintext …

Chosen-ciphertext secure proxy re-encryption without pairings

RH Deng, J Weng, S Liu, K Chen - … 2008, Hong-Kong, China, December 2 …, 2008 - Springer
In a proxy re-encryption system, a semi-trusted proxy can convert a ciphertext originally
intended for Alice into a ciphertext intended for Bob, without learning the underlying …