Articles with "ciphertext" as a keyword



Photo by visuals from unsplash

Expressive attribute-based keyword search with constant-size ciphertext

Sign Up to like & get
recommendations!
Published in 2018 at "Soft Computing"

DOI: 10.1007/s00500-017-2701-9

Abstract: Prior to outsourcing sensitive data, users need to encrypt the data and outsource the ciphertexts to cloud servers. Therefore, efficient search techniques on encrypted data are required. Attribute-based keyword search (ABKS) is a public key… read more here.

Keywords: constant size; search; ciphertext; size ... See more keywords
Photo from wikipedia

Attribute-Based Private Data Sharing With Script-Driven Programmable Ciphertext and Decentralized Key Management in Blockchain Internet of Things

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3124016

Abstract: In this article, we address the problem of secure sensitive data sharing for the specified recipients in Blockchain Internet of Things (BIoT). To do it, we present a cryptographic solution to meet the requirements of… read more here.

Keywords: data sharing; ciphertext; management; internet things ... See more keywords
Photo by campaign_creators from unsplash

Reversible Data Hiding in Homomorphic Encrypted Domain by Mirroring Ciphertext Group

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Circuits and Systems for Video Technology"

DOI: 10.1109/tcsvt.2017.2742023

Abstract: This paper proposes a novel reversible data hiding scheme for encrypted images by using homomorphic and probabilistic properties of Paillier cryptosystem. In the proposed method, groups of adjacent pixels are randomly selected, and reversibly embedded… read more here.

Keywords: ciphertext; group; reversible data; reference ... See more keywords
Photo by bernardhermant from unsplash

TRAC: Traceable and Revocable Access Control Scheme for mHealth in 5G-Enabled IIoT

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2021.3109090

Abstract: Mobile healthcare (mHealth) enables people to collect and share their personal health records (PHRs) and gain rapid medical treatment via mobile 5G-enabled Industrial Internet of Things (IIoT) devices, which also brings the challenge of keeping… read more here.

Keywords: revocable access; mhealth; ciphertext; access control ... See more keywords
Photo by lensingmyworld from unsplash

Attribute-Based Fully Homomorphic Encryption Scheme from Lattices with Short Ciphertext

Sign Up to like & get
recommendations!
Published in 2021 at "Mathematical Problems in Engineering"

DOI: 10.1155/2021/6656764

Abstract: Attribute-based encryption (ABE) is a good choice for one-to-many communication and fine-grained access control of the encryption data in a cloud environment. Fully homomorphic encryption (FHE) allows cloud servers to make valid operations on encrypted… read more here.

Keywords: ciphertext; fully homomorphic; scheme; attribute based ... See more keywords