Searchable attribute-based mechanism with efficient data sharing for secure cloud storage

K Liang, W Susilo - IEEE Transactions on Information Forensics …, 2015 - ieeexplore.ieee.org
To date, the growth of electronic personal data leads to a trend that data owners prefer to
remotely outsource their data to clouds for the enjoyment of the high-quality retrieval and …

A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing

K Liang, MH Au, JK Liu, W Susilo, DS Wong… - Future Generation …, 2015 - Elsevier
Abstract Proxy Re-Encryption (PRE) is a useful cryptographic primitive that allows a data
owner to delegate the access rights of the encrypted data stored on a cloud storage system …

Privacy-preserving personal data operation on mobile cloud—Chances and challenges over advanced persistent threat

MH Au, K Liang, JK Liu, R Lu, J Ning - Future Generation Computer …, 2018 - Elsevier
Bring your own devices have become a new symbol of industrial and education institutional
culture to date. A single individual can gain access to personal data anytime at anywhere of …

A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing

K Liang, MH Au, JK Liu, W Susilo… - IEEE Transactions …, 2014 - ieeexplore.ieee.org
In this paper, for the first time, we define a general notion for proxy re-encryption (PRE),
which we call deterministic finite automata-based functional PRE (DFA-based FPRE) …

Identity-based key-exposure resilient cloud storage public auditing scheme from lattices

X Zhang, H Wang, C Xu - Information Sciences, 2019 - Elsevier
With the rapid development of cloud auditing services, key exposure has been highlighted
as a serious security issue. Using the exposed private key of a client, cloud servers can …

Privacy-preserving ciphertext multi-sharing control for big data storage

K Liang, W Susilo, JK Liu - IEEE transactions on information …, 2015 - ieeexplore.ieee.org
The need of secure big data storage service is more desirable than ever to date. The basic
requirement of the service is to guarantee the confidentiality of the data. However, the …

Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice

Y Zhang, J Li, D Zheng, P Li, Y Tian - Journal of Network and Computer …, 2018 - Elsevier
As an important combination of autonomous vehicle networks (AVNs) and smart grid, the
vehicle-to-grid (V2G) network can facilitate the adoption of renewable resources. Based on …

[PDF][PDF] Research Online

VNT Le, B Apopei, K Alameh - Sciences, 2018 - academia.edu
Abstract© The Institution of Engineering and Technology 2019. The modulus switching
technique has been used in some cryptographic applications as well as in cryptanalysis. For …

A novel revocable and identity-based conditional proxy re-encryption scheme with ciphertext evolution for secure cloud data sharing

S Yao, RVJ Dayot, HJ Kim, IH Ra - IEEE Access, 2021 - ieeexplore.ieee.org
Proxy re-encryption (PRE), with the unique ciphertext transformation ability, enables various
ciphertext authorization applications to be implemented efficiently. However, most existing …

An identity-based proxy re-encryption scheme with single-hop conditional delegation and multi-hop ciphertext evolution for secure cloud data sharing

S Yao, RVJ Dayot, IH Ra, L Xu, Z Mei… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Proxy re-encryption (PRE) provides a promising solution for applications requiring efficient
and secure ciphertext conversion, such as secure cloud data sharing. While the one with the …