Results 31 to 40 of about 19,760 (270)

DSAS: A Secure Data Sharing and Authorized Searchable Framework for e-Healthcare System

open access: yesIEEE Access, 2022
In e-healthcare system, an increasing number of patients enjoy high-quality medical services by sharing encrypted personal healthcare records (PHRs) with doctors or medical research institutions. However, one of the important issues is that the encrypted
Linlin Xue
doaj   +1 more source

Identity-Based Proxy Re-encryption [PDF]

open access: yes, 2007
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the public-key setting. In this paper, we address the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one identityto ...
Matthew Green, ATENIESE, GIUSEPPE
openaire   +1 more source

PRE+: dual of proxy re-encryption for secure cloud data sharing service [PDF]

open access: yes, 2018
With the rapid development of very large, diverse, complex, and distributed datasets generated from internet transactions, emails, videos, business information systems, manufacturing industry, sensors and internet of things etc., cloud and big data ...
Fatos Xhafa   +4 more
core   +2 more sources

Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application

open access: yesTongxin xuebao, 2021
To improve the practicability of homomorphic encryption in the application of multi-user cloud computing, a NTRU-based multi-key homomorphic proxy re-encryption (MKH-PRE) scheme was constructed.Firstly, a new form of NTRU-based multi-key ciphertext was ...
Ruiqi LI, Chunfu JIA, Yafei WANG
doaj   +2 more sources

Security scheduling and transaction mechanism of virtual power plants based on dual blockchains

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2022
Aiming at the data authenticity and storage problems in the current coordinated scheduling of virtual power plants, as well as the opaque information and high transaction costs, a dual blockchains security mechanism is proposed to solve above problems ...
Xiaohong Zhang   +3 more
doaj   +1 more source

Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation [PDF]

open access: yes, 2013
With the wide deployment of public cloud computing infrastructures, using clouds to host data query services has become an appealing solution for the advantages on scalability and cost-saving.
Chen, Keke, Guo, Shumin, Xu, Huiqi
core   +1 more source

Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds

open access: yesIEEE Access, 2022
Cloud computing with massive storage and computing capabilities has become widespread in actual applications. It is critical to ensure secure data sharing in cloud-based applications.
Huidan Hu, Zhenfu Cao, Xiaolei Dong
doaj   +1 more source

A Survey on Data control from sender using cloud computing [PDF]

open access: yes, 2017
To store data more efficiently in cloud security must also be taken into considerations. When certain information is stored in Cloud, it actually means that it resides outside an organization's structure bounds.
S, M. (Muthukumarasamy)   +3 more
core   +1 more source

Inter-domain Identity-Based Proxy Re-encryption [PDF]

open access: yes, 2009
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts have only been devoted to the intra-domain setting, where the delegator and the delegatee are registered in the same domain. In this paper, we investigate the proxy re-encryption
Tang, Qiang   +2 more
openaire   +2 more sources

Validating a Web Service Security Abstraction by Typing [PDF]

open access: yes, 2004
An XML web service is, to a first approximation, an RPC service in which requests and responses are encoded in XML as SOAP envelopes, and transported over HTTP.
Gordon, Andrew D., Pucella, Riccardo
core   +2 more sources

Home - About - Disclaimer - Privacy