J Li, X Lin, Y Zhang, J Han - IEEE Transactions on Services …, 2016 - ieeexplore.ieee.org
Cloud computing becomes increasingly popular for data owners to outsource their data to public cloud servers while allowing intended data users to retrieve these data stored in …
C Ge, Z Liu, J Xia, L Fang - IEEE transactions on dependable …, 2019 - ieeexplore.ieee.org
Cloud computing has become prevalent due to its nature of massive storage and vast computing capabilities. Ensuring a secure data sharing is critical to cloud applications …
K Liang, W Susilo - IEEE Transactions on Information Forensics …, 2015 - ieeexplore.ieee.org
To date, the growth of electronic personal data leads to a trend that data owners prefer to remotely outsource their data to clouds for the enjoyment of the high-quality retrieval and …
Cipher text-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE) extends the traditional Proxy Re-Encryption (PRE) by allowing a semi-trusted proxy to transform a cipher text under …
I Cascudo, B David - … Conference on Applied Cryptography and Network …, 2017 - Springer
Uniform randomness beacons whose output can be publicly attested to be unbiased are required in several cryptographic protocols. A common approach to building such beacons …
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only needs a re …
J Shao, Z Cao - International Workshop on Public Key Cryptography, 2009 - Springer
In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under Alice's public key into another ciphertext that Bob can decrypt. However, the proxy cannot …
H Deng, Z Qin, Q Wu, Z Guan, RH Deng… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
With the rapid development of cloud computing, an increasing number of individuals and organizations are sharing data in the public cloud. To protect the privacy of data stored in the …
RH Deng, J Weng, S Liu, K Chen - … 2008, Hong-Kong, China, December 2 …, 2008 - Springer
In a proxy re-encryption system, a semi-trusted proxy can convert a ciphertext originally intended for Alice into a ciphertext intended for Bob, without learning the underlying …