Two-cloud secure database for numeric-related SQL range queries with privacy preserving

K Xue, S Li, J Hong, Y Xue, N Yu… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Industries and individuals outsource database to realize convenient and low-cost
applications and services. In order to provide sufficient functionality for SQL queries, many …

A cloud-based buyer-seller watermarking protocol (CB-BSWP) using semi-trusted third party for copy deterrence and privacy preserving

A Kumar - Multimedia Tools and Applications, 2022 - Springer
Nowadays, cloud computing provides a platform infrastructure for the secure dealing of
digital data, but privacy and copy control are the two important issues in it over a network …

Accountable proxy re-encryption for secure data sharing

H Guo, Z Zhang, J Xu, N An… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Proxy re-encryption (PRE) provides a promising solution for encrypted data sharing in public
cloud. When data owner Alice is going to share her encrypted data with data consumer Bob …

Security enhanced RFID authentication protocols for healthcare environment

S Xie, F Zhang, R Cheng - Wireless Personal Communications, 2021 - Springer
RFID technology, which is concerned as one of the core technologies of Internet of Things,
has been widely deployed in healthcare environment and brings a lot of convenience for …

Obfustopia built on secret-key functional encryption

F Kitagawa, R Nishimaki, K Tanaka - … on the Theory and Applications of …, 2018 - Springer
We show that indistinguishability obfuscation (IO) for all circuits can be constructed solely
from secret-key functional encryption (SKFE). In the construction, SKFE need to be able to …

Obfustopia built on secret-key functional encryption

F Kitagawa, R Nishimaki, K Tanaka - Journal of Cryptology, 2022 - Springer
We show that indistinguishability obfuscation (IO) for all circuits can be constructed solely
from secret-key functional encryption (SKFE). In the construction, SKFE needs to be secure …

The Case for the Anonymization of Offloaded Computation

MW Al Azad, S Sarwar, SU Taki… - 2023 IEEE 16th …, 2023 - ieeexplore.ieee.org
Computation offloading (often to external computing resources over a network) has become
a necessity for modern applications. At the same time, the proliferation of machine learning …

Public Proofs of Data Replication and Retrievability with User-friendly Replication

J Shen, X Chen, X Huang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Proofs of Retrievability (PoRs) and Provable Data Possession (PDP) are efficient
cryptographic solutions to monitoring the state of storage, enabling integrity verification …

An n-tier fog architecture for smart farming

G Penzotti, S Caselli, M Amoretti - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Current smart farming solutions are either local or cloud-based. The first approach limits the
types and scale of available data processing services. In the second approach, the physical …

Non-transferable proxy re-encryption

H Guo, Z Zhang, J Xu, N An, L Chen - The Computer Journal, 2019 - ieeexplore.ieee.org
The traditional security notion of proxy re-encryption (PRE) focuses on preventing the proxy
learning anything about the encrypted messages. However, such a basic security …