An efficient blockchain-based hierarchical data sharing for Healthcare Internet of Things

J Zhang, Y Yang, X Liu, J Ma - IEEE Transactions on Industrial …, 2022 - ieeexplore.ieee.org
With the assistance of the Internet of Things, the fast developing Healthcare Internet of
Things (H-IoT) has promoted the healthcare ecosystem into the era of Health 5.0 and …

Public-key authenticated encryption with keyword search revisited: Security model and constructions

B Qin, Y Chen, Q Huang, X Liu, D Zheng - Information Sciences, 2020 - Elsevier
In cloud era, it is necessary to store sensitive data in an encrypted form. This arises the
interesting and challenging problem of searching on encrypted data. However, previous …

Multi-authority attribute-based keyword search over encrypted cloud data

Y Miao, RH Deng, X Liu, KKR Choo… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Searchable Encryption (SE) is an important technique to guarantee data security and
usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …

Verifiable searchable encryption framework against insider keyword-guessing attack in cloud storage

Y Miao, Q Tong, RH Deng, KKR Choo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Searchable encryption (SE) allows cloud tenants to retrieve encrypted data while preserving
data confidentiality securely. Many SE solutions have been designed to improve efficiency …

A blockchain-based searchable public-key encryption with forward and backward privacy for cloud-assisted vehicular social networks

B Chen, L Wu, H Wang, L Zhou… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As the integration of the Internet of Vehicles and social networks, vehicular social networks
(VSN) not only improves the efficiency and reliability of vehicular communication …

PFLM: Privacy-preserving federated learning with membership proof

C Jiang, C Xu, Y Zhang - Information Sciences, 2021 - Elsevier
Privacy-preserving federated learning is distributed machine learning where multiple
collaborators train a model through protected gradients. To achieve robustness to users …

A Survey on Searchable Symmetric Encryption

F Li, J Ma, Y Miao, X Liu, J Ning, RH Deng - ACM Computing Surveys, 2023 - dl.acm.org
Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption
(SSE), one of the methods for protecting outsourced data, has arisen widespread interest …

Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage

X Zhang, Y Tang, H Wang, C Xu, Y Miao, H Cheng - Information Sciences, 2019 - Elsevier
Public-key encryption with keyword search (PEKS) enables users to search over encrypted
data and retrieve target data efficiently. However, most of existing PEKS schemes are …

Lightweight privacy-preserving medical diagnosis in edge computing

Z Ma, J Ma, Y Miao, X Liu, KKR Choo… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
With the development of machine learning, it is popular that mobile users can submit
individual symptoms at any time anywhere for medical diagnosis. Edge computing is …

Secure online/offline data sharing framework for cloud-assisted industrial Internet of Things

Y Miao, Q Tong, KKR Choo, X Liu… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
Ciphertext-policy attribute-based keyword search (CP-ABKS) schemes facilitate the fine-
grained keyword search over encrypted data, such as those sensed/collected from Industrial …