Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices

QM Malluhi, A Shikfa, VD Tran, VC Trinh - Computer Communications, 2019 - Elsevier
In a traditional attribute-based encryption (ABE) system, there is only one central authority
who generates and hence knows the secret keys of all users, this problem is known as the …

Attribute‐based broadcast encryption scheme for lightweight devices

S Canard, DH Phan, VC Trinh - IET Information Security, 2018 - Wiley Online Library
Lightweight devices, such as a smartcard associated with a top‐box decoder in pay‐TV or a
SIM card coupled with a powerful (but not totally trusted) smartphone, play an important role …

Efficient dynamic key‐aggregate cryptosystem for secure and flexible data sharing

G Pareek, S Maiti - Concurrency and Computation: Practice …, 2023 - Wiley Online Library
Secure and efficient enforcement of dynamic access control policies on shared data is a
central problem in dynamic and scalable application scenarios, including the Internet of …

[HTML][HTML] A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption

S Canard, DH Phan, D Pointcheval, VC Trinh - Theoretical Computer …, 2018 - Elsevier
Abstract Standard Broadcast Encryption (BE) and Attribute-Based Encryption (ABE) aim at
sending a content to a large arbitrary group of users at once. Regarding Broadcast …

DAG-: A DAG-Based Sigma Protocol for Relations in CNF

G Zeng, J Lai, Z Huang, Y Wang, Z Zheng - International Conference on …, 2022 - Springer
Abstract At CRYPTO 1994, Cramer, Damgård and Schoenmakers proposed a general
method to construct proofs of knowledge (PoKs), especially for k-out-of-n partial knowledge …

Certificateless public key cryptography in the standard model

S Canard, VC Trinh - Fundamenta informaticae, 2018 - content.iospress.com
Identity-based cryptography has been introduced by Shamir at Crypto'84 to avoid the use of
expensive certificates in certified public key cryptography. In such system, the identity …

[PDF][PDF] Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in Electronic Medical Record in Lahore, Pakistan

F Saddique, N Mushtaq, R Hasan… - . Netw. Commun. Syst …, 2022 - academia.edu
This work is now contributing to creating a system built on the effective sharing of secure
IPFS (Interplanetary file system) for electronic medical records and, in addition …

A Short Server‐Aided Certificateless Aggregate Multisignature Scheme in the Standard Model

VC Trinh - Security and Communication Networks, 2019 - Wiley Online Library
Aggregate signature scheme allows each signer to sign a different message and then all
those signatures are aggregated into a single short signature. In contrast, multisignature …

One-Verifier Signature Scheme and Its Applications

VA Trinh, VC Trinh - Proceedings of the 10th International Symposium on …, 2019 - dl.acm.org
In the traditional digital signature scheme, anyone can check the validity of a signer's
signature. However, in some practical applications, such as e-Voting, e-Health, e-Payment …

A ciphertext-policy attribute-based searchable encryption scheme in non-interactive model

VC Trinh - Journal of Computer Science and Cybernetics, 2019 - vjs.ac.vn
We address the problem of searching on encrypted data with expressive searching
predicate and multi-writer/multi-reader, a cryptographic primitive which has many concrete …