Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

S Ullah, J Zheng, N Din, MT Hussain, F Ullah… - Computer Science …, 2023 - Elsevier
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …

Data security and privacy protection for cloud storage: A survey

P Yang, N Xiong, J Ren - Ieee Access, 2020 - ieeexplore.ieee.org
The new development trends including Internet of Things (IoT), smart city, enterprises digital
transformation and world's digital economy are at the top of the tide. The continuous growth …

Attribute-based encryption with parallel outsourced decryption for edge intelligent IoV

C Feng, K Yu, M Aloqaily, M Alazab… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Edge intelligence is an emerging concept referring to processes in which data are collected
and analyzed and insights are delivered close to where the data are captured in a network …

An efficient ciphertext-policy weighted attribute-based encryption for the internet of health things

H Li, K Yu, B Liu, C Feng, Z Qin… - IEEE journal of …, 2021 - ieeexplore.ieee.org
The Internet of Health Things (IoHT) is a medical concept that describes uniquely identifiable
devices connected to the Internet that can communicate with each other. As one of the most …

Security and privacy in smart health: Efficient policy-hiding attribute-based access control

Y Zhang, D Zheng, RH Deng - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
With the rapid development of the Internet of Things and cloud computing technologies,
smart health (s-health) is expected to significantly improve the quality of health care …

Attribute based encryption with privacy protection and accountability for CloudIoT

J Li, Y Zhang, J Ning, X Huang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The pervasive, ubiquitous, and heterogeneous properties of IoT make securing IoT systems
a very challenging task. More so when access and storage are performed through a cloud …

Attribute-based encryption for cloud computing access control: A survey

Y Zhang, RH Deng, S Xu, J Sun, Q Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …

KSF-OABE: Outsourced attribute-based encryption with keyword search function for cloud storage

J Li, X Lin, Y Zhang, J Han - IEEE Transactions on Services …, 2016 - ieeexplore.ieee.org
Cloud computing becomes increasingly popular for data owners to outsource their data to
public cloud servers while allowing intended data users to retrieve these data stored in …

Decentralizing attribute-based encryption

A Lewko, B Waters - Annual international conference on the theory and …, 2011 - Springer
Abstract We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our
system, any party can become an authority and there is no requirement for any global …

Flexible and fine-grained attribute-based data storage in cloud computing

J Li, W Yao, Y Zhang, H Qian… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
With the development of cloud computing, outsourcing data to cloud server attracts lots of
attentions. To guarantee the security and achieve flexibly fine-grained file access control …