Results 31 to 40 of about 20,722 (263)
With the maturity of technologies such as Internet of Things (IoT) and Cloud Computing, more and more medical institutions share patient's medical data in the IoT-connected healthcare system, whereas it also brings hidden dangers to data security and ...
Xi Chen +3 more
doaj +1 more source
Hierarchical Identity-Based Online/Offline Encryption
The notion of identity-based online/offline encryption (IBOOE) was recently introduced by Guo, Mu and Chen in FC 2008. In an IBOOE system, the encryption is split into online and offline phases. The offline phase is performed prior to the arrival of a message and the recipient's public key (or,identity).
Zhongren Liu +4 more
openaire +2 more sources
Accountable and Verifiable Outsourced Hierarchical Attribute Encryption Scheme Based on Blockchain [PDF]
With the advent of the big data era, the proliferation of information types has increased the requirements for controlled data sharing. Decentralized Attribute-Based Encryption (DABE) has been widely studied in this context to enable fine-grained access ...
JIANG Qiqi, ZHANG Liang, PENG Lingqi, KAN Haibin
doaj +1 more source
Hierarchical blockchain structure for node authentication in IoT networks
Internet of Things (IoT) networks are large peer-to-peer networks of small devices that require a competent security system that is scalable and adaptable to the limited resources of the IoT devices. Node authentication is a crucial part of IoT security.
Mahmoud Tayseer Al Ahmed +3 more
doaj +1 more source
The Melbourne Shuffle: Improving Oblivious Storage in the Cloud [PDF]
We present a simple, efficient, and secure data-oblivious randomized shuffle algorithm. This is the first secure data-oblivious shuffle that is not based on sorting. Our method can be used to improve previous oblivious storage solutions for network-based
B. Pinkas +6 more
core +1 more source
In the era of big data, cloud-based industrial applications can provide available and convenient data access for resource-constrained smart devices. Attribute-based encryption can be used to ensure data security while providing fine-grained data access ...
Qian Zhang +4 more
doaj +1 more source
Identity Based Group Signatures from Hierarchical Identity-Based Encryption [PDF]
A number of previous papers explored the notion of identity-based group signature. We present a generic construction of identity-based group signatures. Our construction is based on the Naor transformation of a identity-based signature out of an identity-based encryption, adjusted to hierarchical identity-based encryption.
Nigel P. Smart, Bogdan Warinschi
openaire +1 more source
Zero trust anonymous access algorithm for multi cloud storage system based on CP-ABE
This paper proposes a zero-trust anonymous access algorithm for multi-cloud storage systems based on CP-ABE (Ciphertext-Policy Attribute-Based Encryption).
Jun Tian
doaj +1 more source
ID-Based User-Centric Data Usage Auditing Scheme for Distributed Environments
Recent years have witnessed the trend of increasingly relying on remote and distributed infrastructures, mainly owned and managed by third parties. This increased the number of reported incidents of security breaches compromising users' personal data ...
Nesrine Kaaniche +4 more
doaj +1 more source
Biometric identity-based cryptography for e-Government environment [PDF]
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core +1 more source

