Secure outsourced attribute-based signatures

X Chen, J Li, X Huang, J Li, Y Xiang… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Attribute-based signature (ABS) enables users to sign messages over attributes without
revealing any information other than the fact that they have attested to the messages …

Pay as you decrypt: Decryption outsourcing for functional encryption using blockchain

H Cui, Z Wan, X Wei, S Nepal… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The concept of functional encryption (FE) has been introduced to address the shortcomings
of public-key encryption (PKE) in many emerging applications which require both data …

On lightweight security enforcement in cyber-physical systems

Y Yang, J Lu, KKR Choo, JK Liu - … 10–11, 2015, Revised Selected Papers …, 2016 - Springer
Cyber-physical systems (CPS) are a key component in industrial control systems (ICS),
which are widely used in the critical infrastructure sectors. The increasing reliance on CPS …

[PDF][PDF] A note on efficient algorithms for secure outsourcing of bilinear pairings

L Liu, Z Cao - International Journal of Electronics and Information …, 2016 - ijeie.jalaxy.com.tw
Recently, Chen et al. have proposed a scheme [Theoretical Computer Science, 562 (2015),
112-121] for secure outsourcing of bilinear pairings. The scheme is motivated by the …

[PDF][PDF] Directly Revocable and Verifiable Key-Policy Attribute-based Encryption for Large Universe.

H Ma, T Peng, Z Liu - Int. J. Netw. Secur., 2017 - academia.edu
For practical data sharing applications, many attributebased encryption (ABE) schemes
were proposed with different kinds of properties, such as supporting large universe …

[PDF][PDF] Analysis of One Scheme for Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates.

Z Cao, L Liu, O Markowitch - Int. J. Netw. Secur., 2017 - academia.edu
Cloud computing supports a paradigm shift from local to network-centric computing and
enables customers with limited computational resources to outsource large-scale …

Publicly verifiable ciphertexts

JM González Nieto, M Manulis, B Poettering… - … and Cryptography for …, 2012 - Springer
In many applications where encrypted traffic flows from an open (public) domain to a
protected (private) domain there exists a gateway that bridges the two domains and faithfully …

SOK: Research Motivations of Public-Key Cryptography

F Guo, W Susilo, X Chen, P Jiang, J Lai… - Cryptology ePrint …, 2023 - eprint.iacr.org
The design, proposal, and analysis of cryptographic primitives and protocols (schemes) are
one of the primary research fields in cryptology. To advance this research field, it is crucial to …

Server–aided identity–based anonymous broadcast encryption

H Cui, Y Mu, F Guo - International Journal of Security and …, 2013 - inderscienceonline.com
A broadcast encryption scheme enables a broadcaster to send an encrypted message to the
multiple privileged users. In identity–based broadcast encryption schemes, a broadcaster …

A Verifiable Commitment Scheme of Encrypted Shared Data for Internet of Mobile Things

Z He, W Tan, Y Long, Y Yang… - 2024 IEEE/CIC …, 2024 - ieeexplore.ieee.org
In the Internet of Mobile Things (IoMT), big data storage and high-speed data processing
capabilities are delegated to cloud computing, which effectively reduces the resource …