DSAS: A Secure Data Sharing and Authorized Searchable Framework for e-Healthcare System
In e-healthcare system, an increasing number of patients enjoy high-quality medical services by sharing encrypted personal healthcare records (PHRs) with doctors or medical research institutions. However, one of the important issues is that the encrypted
Linlin Xue
doaj +1 more source
Identity-Based Proxy Re-encryption [PDF]
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the public-key setting. In this paper, we address the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one identityto ...
Matthew Green, ATENIESE, GIUSEPPE
openaire +1 more source
PRE+: dual of proxy re-encryption for secure cloud data sharing service [PDF]
With the rapid development of very large, diverse, complex, and distributed datasets generated from internet transactions, emails, videos, business information systems, manufacturing industry, sensors and internet of things etc., cloud and big data ...
Fatos Xhafa +4 more
core +2 more sources
Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
To improve the practicability of homomorphic encryption in the application of multi-user cloud computing, a NTRU-based multi-key homomorphic proxy re-encryption (MKH-PRE) scheme was constructed.Firstly, a new form of NTRU-based multi-key ciphertext was ...
Ruiqi LI, Chunfu JIA, Yafei WANG
doaj +2 more sources
Security scheduling and transaction mechanism of virtual power plants based on dual blockchains
Aiming at the data authenticity and storage problems in the current coordinated scheduling of virtual power plants, as well as the opaque information and high transaction costs, a dual blockchains security mechanism is proposed to solve above problems ...
Xiaohong Zhang +3 more
doaj +1 more source
Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation [PDF]
With the wide deployment of public cloud computing infrastructures, using clouds to host data query services has become an appealing solution for the advantages on scalability and cost-saving.
Chen, Keke, Guo, Shumin, Xu, Huiqi
core +1 more source
Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds
Cloud computing with massive storage and computing capabilities has become widespread in actual applications. It is critical to ensure secure data sharing in cloud-based applications.
Huidan Hu, Zhenfu Cao, Xiaolei Dong
doaj +1 more source
A Survey on Data control from sender using cloud computing [PDF]
To store data more efficiently in cloud security must also be taken into considerations. When certain information is stored in Cloud, it actually means that it resides outside an organization's structure bounds.
S, M. (Muthukumarasamy) +3 more
core +1 more source
Inter-domain Identity-Based Proxy Re-encryption [PDF]
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts have only been devoted to the intra-domain setting, where the delegator and the delegatee are registered in the same domain. In this paper, we investigate the proxy re-encryption
Tang, Qiang +2 more
openaire +2 more sources
Validating a Web Service Security Abstraction by Typing [PDF]
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Gordon, Andrew D., Pucella, Riccardo
core +2 more sources

