B Qin, Y Chen, Q Huang, X Liu, D Zheng - Information Sciences, 2020 - Elsevier
In cloud era, it is necessary to store sensitive data in an encrypted form. This arises the interesting and challenging problem of searching on encrypted data. However, previous …
Searchable Encryption (SE) is an important technique to guarantee data security and usability in the cloud at the same time. Leveraging Ciphertext-Policy Attribute-Based …
Searchable encryption (SE) allows cloud tenants to retrieve encrypted data while preserving data confidentiality securely. Many SE solutions have been designed to improve efficiency …
B Chen, L Wu, H Wang, L Zhou… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As the integration of the Internet of Vehicles and social networks, vehicular social networks (VSN) not only improves the efficiency and reliability of vehicular communication …
C Jiang, C Xu, Y Zhang - Information Sciences, 2021 - Elsevier
Privacy-preserving federated learning is distributed machine learning where multiple collaborators train a model through protected gradients. To achieve robustness to users …
Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption (SSE), one of the methods for protecting outsourced data, has arisen widespread interest …
X Zhang, Y Tang, H Wang, C Xu, Y Miao, H Cheng - Information Sciences, 2019 - Elsevier
Public-key encryption with keyword search (PEKS) enables users to search over encrypted data and retrieve target data efficiently. However, most of existing PEKS schemes are …
With the development of machine learning, it is popular that mobile users can submit individual symptoms at any time anywhere for medical diagnosis. Edge computing is …
Ciphertext-policy attribute-based keyword search (CP-ABKS) schemes facilitate the fine- grained keyword search over encrypted data, such as those sensed/collected from Industrial …