Sign Up to like & get
recommendations!
0
Published in 2018 at "Soft Computing"
DOI: 10.1007/s00500-017-2701-9
Abstract: Prior to outsourcing sensitive data, users need to encrypt the data and outsource the ciphertexts to cloud servers. Therefore, efficient search techniques on encrypted data are required. Attribute-based keyword search (ABKS) is a public key…
read more here.
Keywords:
constant size;
search;
ciphertext;
size ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3124016
Abstract: In this article, we address the problem of secure sensitive data sharing for the specified recipients in Blockchain Internet of Things (BIoT). To do it, we present a cryptographic solution to meet the requirements of…
read more here.
Keywords:
data sharing;
ciphertext;
management;
internet things ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Transactions on Circuits and Systems for Video Technology"
DOI: 10.1109/tcsvt.2017.2742023
Abstract: This paper proposes a novel reversible data hiding scheme for encrypted images by using homomorphic and probabilistic properties of Paillier cryptosystem. In the proposed method, groups of adjacent pixels are randomly selected, and reversibly embedded…
read more here.
Keywords:
ciphertext;
group;
reversible data;
reference ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2021.3109090
Abstract: Mobile healthcare (mHealth) enables people to collect and share their personal health records (PHRs) and gain rapid medical treatment via mobile 5G-enabled Industrial Internet of Things (IIoT) devices, which also brings the challenge of keeping…
read more here.
Keywords:
revocable access;
mhealth;
ciphertext;
access control ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "Mathematical Problems in Engineering"
DOI: 10.1155/2021/6656764
Abstract: Attribute-based encryption (ABE) is a good choice for one-to-many communication and fine-grained access control of the encryption data in a cloud environment. Fully homomorphic encryption (FHE) allows cloud servers to make valid operations on encrypted…
read more here.
Keywords:
ciphertext;
fully homomorphic;
scheme;
attribute based ... See more keywords