Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage

B Cui, Z Liu, L Wang - IEEE Transactions on computers, 2015 - ieeexplore.ieee.org
The capability of selectively sharing encrypted data with different users via public cloud
storage may greatly ease security concerns over inadvertent data leaks in the cloud. A key …

An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing

K Liang, JK Liu, DS Wong, W Susilo - … 7-11, 2014. Proceedings, Part I 19, 2014 - Springer
Identity-based encryption (IBE) eliminates the necessity of having a costly certificate
verification process. However, revocation remains as a daunting task in terms of ciphertext …

Secure data sharing in cloud computing using revocable-storage identity-based encryption

J Wei, W Liu, X Hu - IEEE Transactions on Cloud Computing, 2016 - ieeexplore.ieee.org
Cloud computing provides a flexible and convenient way for data sharing, which brings
various benefits for both the society and individuals. But there exists a natural resistance for …

Location-sharing systems with enhanced privacy in mobile online social networks

J Li, H Yan, Z Liu, X Chen, X Huang… - IEEE Systems …, 2015 - ieeexplore.ieee.org
Location sharing is one of the critical components in mobile online social networks
(mOSNs), which has attracted much attention recently. With the advent of mOSNs, more and …

Adaptively secure certificate-based broadcast encryption and its application to cloud storage service

L Chen, J Li, Y Lu, Y Zhang - Information Sciences, 2020 - Elsevier
The existing public key broadcast encryption schemes are mainly constructed in identity-
based cryptosystem, which bears the inherent problems of key escrow and key distribution …

A lightweight privacy-preserving fair meeting location determination scheme

H Shen, M Zhang, H Wang, F Guo… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Equipped with mobile devices, people relied on location-based services (LBSs) can
expediently and reasonably organize their activities. But location information may disclose …

Anonymous identity-based broadcast encryption with revocation for file sharing

J Lai, Y Mu, F Guo, W Susilo, R Chen - … , Melbourne, VIC, Australia, July 4-6 …, 2016 - Springer
Traditionally, a ciphertext from an identity-based broadcast encryption can be distributed to a
group of receivers whose identities are included in the ciphertext. Once the ciphertext has …

Anonymous certificate-based broadcast encryption with constant decryption cost

J Li, L Chen, Y Lu, Y Zhang - Information Sciences, 2018 - Elsevier
Most of the existing broadcast encryption schemes are constructed in either public key
cryptosystem or identity-based cryptosystem. However, the overload of certificate …

Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city

J Lai, Y Mu, F Guo, W Susilo, R Chen - Personal and Ubiquitous computing, 2017 - Springer
One of the interesting secure applications in the smart city is broadcasting information to
legitimate users, desirably with user privacy. Broadcast encryption has been considered as …

Attribute based broadcast encryption with short ciphertext and decryption key

TVX Phuong, G Yang, W Susilo, X Chen - Computer Security--ESORICS …, 2015 - Springer
Abstract Attribute Based Broadcast Encryption (ABBE) is a combination of Attribute Based
Encryption (ABE) and Broadcast Encryption (BE). It allows a broadcaster (or encrypter) to …