Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
From MaRDI portal
Publication:2292920
DOI10.1016/J.INS.2016.04.015zbMath1429.68068OpenAlexW2345068994WikidataQ115042068 ScholiaQ115042068MaRDI QIDQ2292920
Duncan S. Wong, Hui Li, Ilsun You, Xiaofeng Chen, Jin Li, Ying-Hui Zhang
Publication date: 6 February 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2016.04.015
Data encryption (aspects in computer science) (68P25) Internet topics (68M11) Privacy of data (68P27)
Related Items (15)
An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage ⋮ Efficient and secure big data storage system with leakage resilience in cloud computing ⋮ Identity-based data storage scheme with anonymous key generation in fog computing ⋮ Cloud-assisted secure biometric identification with sub-linear search efficiency ⋮ PGAS: privacy-preserving graph encryption for accurate constrained shortest distance queries ⋮ Efficient ciphertext-policy attribute-based encryption with blackbox traceability ⋮ Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack ⋮ Identity-based key-exposure resilient cloud storage public auditing scheme from lattices ⋮ Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage ⋮ Practical public key encryption with selective opening security for receivers ⋮ A hierarchical group key agreement protocol using orientable attributes for cloud computing ⋮ Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity ⋮ Supporting dynamic updates in storage clouds with the Akl-Taylor scheme ⋮ Cryptography-based secure data storage and sharing using HEVC and public clouds ⋮ An adaptive virtual relaying set scheme for loss-and-delay sensitive WSNs
Cites Work
- Unnamed Item
- Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
- An expressive and provably secure ciphertext-policy attribute-based encryption
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
- Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
- Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
- Fully Secure Cipertext-Policy Hiding CP-ABE
- Decentralizing Attribute-Based Encryption
- Privacy-Aware Attribute-Based Encryption with User Accountability
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
- Constant Size Ciphertexts in Threshold Attribute-Based Encryption
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Multi-authority Attribute Based Encryption
- Attribute-Based Encryption with Fast Decryption
- Secure integration of asymmetric and symmetric encryption schemes
- PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Fuzzy Identity-Based Encryption
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
This page was built for publication: Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing