Results 31 to 40 of about 10,953 (251)

What If Keys Are Leaked? towards Practical and Secure Re-Encryption in Deduplication-Based Cloud Storage

open access: yesInformation, 2021
By only storing a unique copy of duplicate data possessed by different data owners, deduplication can significantly reduce storage cost, and hence is used broadly in public clouds.
Weijing You, Lei Lei, Bo Chen, Limin Liu
doaj   +1 more source

Authenticated key agreement mediated by a proxy re-encryptor for the Internet of Things [PDF]

open access: yes, 2016
International audienceThe Internet of Things (IoT) is composed of a wide range of heterogeneous network devices that communicate with their users and the surrounding devices.
A Syalim   +17 more
core   +3 more sources

Secure Encrypted Data With Authorized Deduplication in Cloud

open access: yesIEEE Access, 2019
In this paper, we propose a novel secure role re-encryption system (SRRS), which is based on convergent encryption and the role re-encryption algorithm to prevent the privacy data leakage in cloud and it also achieves the authorized deduplication and ...
Jinbo Xiong   +4 more
doaj   +1 more source

Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices [PDF]

open access: yes, 2014
In this work we define multiple relaxations to the definition of correctness in secure obfuscation. While still remaining meaningful, these relaxations provide ways to obfuscate many primitives in a more direct and efficient way. In particular, we first show how to construct a secure obfuscator for the re-encryption primitive from the Decisional ...
Nishanth Chandran   +4 more
openaire   +1 more source

Encryption and Re-Randomization Techniques for Malware Propagation

open access: yesIEEE Access, 2021
Encryption, which is essential for the protection of sensitive information can also transform any malicious content to illegible form, which can then reside in any network, undetected.
Ahsan Rasheed Abbasi   +5 more
doaj   +1 more source

Non-transferable Proxy Re-encryption [PDF]

open access: yesThe Computer Journal, 2018
The traditional security notion of proxy re-encryption (PRE) focuses on preventing the proxy learning anything about the encrypted messages. However, such a basic security requirement is clearly not enough for scenarios where the proxy can collude with Bob.
Hui Guo   +3 more
openaire   +1 more source

Longitude : a privacy-preserving location sharing protocol for mobile applications [PDF]

open access: yes, 2011
Location sharing services are becoming increasingly popular. Although many location sharing services allow users to set up privacy policies to control who can access their location, the use made by service providers remains a source of concern.
A. Beresford   +14 more
core   +1 more source

Key Rotation for Authenticated Encryption [PDF]

open access: yes, 2017
A common requirement in practice is to periodically rotate the keys used to encrypt stored data. Systems used by Amazon and Google do so using a hybrid encryption technique which is eminently practical but has questionable security in the face of key ...
A Boldyreva   +17 more
core   +2 more sources

Shared and searchable encrypted data for untrusted servers [PDF]

open access: yes, 2011
Current security mechanisms are not suitable for organisations that outsource their data management to untrusted servers. Encrypting and decrypting sensitive data at the client side is the normal approach in this situation but has high communication and ...
Dong, Changyu   +2 more
core   +1 more source

Resplittable threshold multi-broker proxy re-encryption scheme from lattices

open access: yesTongxin xuebao, 2017
Two different encryption schemes and Lagrange polynomial were used to construct a resplittable threshold multi-broker proxy re-encryption scheme on the lattice,namely the encryption in the ciphertext input and output side was different from the ...
Ju-yan LI, Chun-guang MA, Qian ZHAO
doaj   +2 more sources

Home - About - Disclaimer - Privacy