Towards differential access control and privacy-preserving for secure media data sharing in the cloud

T Zheng, Y Luo, T Zhou, Z Cai - Computers & Security, 2022 - Elsevier
The development of cloud computing techniques has promoted the continuous sharing of a
tremendous amount of media data. However, the involved parties in such processes usually …

KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage

G Pareek, BR Purushothama - Journal of information security and …, 2021 - Elsevier
Key-aggregate cryptosystems (KAC) have attracted significant attention from the research
community because of their elegance and efficiency in enforcing predefined access control …

Secure content distribution with access control enforcement in named data networking

H Htet Hlaing, Y Funamoto, M Mambo - Sensors, 2021 - mdpi.com
NDN is one of the new emerging future internet architectures which brings up new solutions
over today's internet architecture, facilitating content distribution, in-network caching, mobility …

Towards achieving efficient access control of medical data with both forward and backward secrecy

S Panda, S Mondal, R Dewri, AK Das - Computer Communications, 2022 - Elsevier
Healthcare service providers store the patients' electronic medical records in the cloud in
order to provide high quality healthcare services. Patients' sensitive data is typically …

[HTML][HTML] Lattice-based key private pres with hra security and pcs security

Y Wang, Y Zhao, M Wang - Computer Standards & Interfaces, 2024 - Elsevier
Proxy re-encryption (PRE) schemes, which nicely solve the problem of delegating
decryption rights, enable a semi-trusted proxy to transform a ciphertext encrypted under one …

Efficient Fine-Grained Data Sharing based on Proxy Re-encryption in IIoT

Q Zhang, Y Fu, J Cui, D He… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the development of the industrial Internet of Things (IIoT), the amount of data generated
by industrial manufacturing equipment will increase. To reduce the cost of data management …

Hierarchal Bilateral Access Control With Constant Size Ciphertexts for Mobile Cloud Computing

A Wu, Y Zhang, J Zhu, Q Zhao… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Mobile cloud computing (MCC) integrates the advantages of mobile networks and cloud
computing, enabling users to enjoy personalized services without constraints and …

TP-PRE: threshold progressive proxy re-encryption, its definitions, construction and applications

G Pareek, BR Purushothama - Journal of Ambient Intelligence and …, 2021 - Springer
Proxy re-encryption (PRE) is a public-key cryptography primitive that delegates the
decryption capabilities of a user (called delegator) to another user (called delegatee) using …

Decentralized Anonymous IoT Data Sharing with Key-Private Proxy Re-Encryption

E Günsay, O Yayla - International Journal of Information Security …, 2024 - dergipark.org.tr
Secure and scalable data sharing is one of the main concerns of the Internet of Things (IoT)
ecosystem. In this paper, we introduce a novel blockchain-based data-sharing construction …

Improved AB-CPREs with HRA Security

Y Zhang, Y Wang, M Wang - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Attribute-based conditional proxy re-encryption (AB-CPRE) schemes offer flexible controls
over delegations of decryption rights, and offer an efficient solution for enforcing access …