Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme

XA Wang, F Xhafa, J Ma, Z Zheng - Journal of Parallel and Distributed …, 2019 - Elsevier
Currently we are witnessing a rapid integration of social networks and cloud computing,
especially on storing social media contents on cloud storage due to its cheap management …

Improved secure fuzzy auditing protocol for cloud data storage

J Zhang, B Wang, D He, XA Wang - Soft Computing, 2019 - Springer
Nowadays, more and more people prefer to outsource their storage to the cloud; however,
due to some accidents, cloud storage service providers may lose some data outsourced by …

Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation

J Zhang, B Wang, F Xhafa, XA Wang, C Li - Journal of Ambient Intelligence …, 2019 - Springer
In this paper two new ways for efficient secure outsourcing the decryption of key-policy
attribute-based encryption (KP-ABE KP-ABE) with energy efficiency are proposed. Based on …

Improved publicly verifiable group sum evaluation over outsourced data streams in IoT setting

XA Wang, Y Liu, AK Sangaiah, J Zhang - Computing, 2019 - Springer
With the continuous development of the internet of things (IoT) technology, large amount of
data has been generated by lots of IoT devices which require large-scale data processing …

Improved functional proxy re-encryption schemes for secure cloud data sharing

XA Wang, X Yang, C Li, Y Liu, Y Ding - Computer Science and …, 2018 - doiserbia.nb.rs
Recently Liang et al. propose an interesting privacy-preserving ciphertext multi-sharing
control for big data storage mechanism, which is based on the cryptographic primitive of …

A privacy-preserving fuzzy interest matching protocol for friends finding in social networks

XA Wang, F Xhafa, X Luo, S Zhang, Y Ding - Soft Computing, 2018 - Springer
Nowadays, it is very popular to make friends, share photographs, and exchange news
throughout social networks. Social networks widely expand the area of people's social …

Reusable garbled gates for new fully homomorphic encryption service

XA Wang, F Xhafa, J Ma, Y Cao… - International journal of …, 2017 - inderscienceonline.com
In this paper, we propose a novel way to provide a fully homomorphic encryption service,
namely by using garbled circuits. From a high level perspective, garbled circuits and fully …

Identity based proxy re-encryption scheme (ibpre+) for secure cloud data sharing

XA Wang, F Xhafa, Z Zheng… - … Conference on Intelligent …, 2016 - ieeexplore.ieee.org
In proxy re-encryption (PRE), a proxy with re-encryption keys can transfer aciphertext
computed under Alice's public key into a new one, which can be decrypted by Bob only with …

Network optimisation for improving security and safety level of dangerous goods transportation based on cloud computing

H Wang, G Xiao, Z Wei, T Hai - International journal of …, 2019 - inderscienceonline.com
Network optimisation for improving security and safety level of dangerous goods
transportation (NOISSLDGT) belongs to NP-hard problems with strict constraints, and that …

Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud

L Zhang, Z Wang, Y Mu, Y Hu - International Journal of High …, 2018 - inderscienceonline.com
Cloud computing provides dynamically scalable resources provisioned as a service over
networks. But untrustworthy cloud service provider (CSP) offers a big obstacle for the …