Articles with "proxy encryption" as a keyword



Photo from wikipedia

Data sharing using proxy re-encryption based on DNA computing

Sign Up to like & get
recommendations!
Published in 2020 at "Soft Computing"

DOI: 10.1007/s00500-019-04041-z

Abstract: Cloud data sharing allows users to access data stored on the web object. Security and protecting cloud data sharing form different attacks is recently considered one of the most challenges. In this paper, we are… read more here.

Keywords: proxy encryption; access; data sharing; based dna ... See more keywords
Photo by hudsoncrafted from unsplash

Hybrid Lightweight Proxy Re-Encryption Scheme for Secure Fog-to-Things Environment

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2984317

Abstract: Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central processing of the vast amount of IoT data. Although fog computing has the advantages of low latency, storage, and computing resources… read more here.

Keywords: secure; proxy encryption; encryption scheme; fog things ... See more keywords
Photo by thisisengineering from unsplash

Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3200084

Abstract: Cloud computing with massive storage and computing capabilities has become widespread in actual applications. It is critical to ensure secure data sharing in cloud-based applications. Currently, numerous identity-based broadcast proxy re-encryption (IB-BPRE) schemes have been… read more here.

Keywords: encryption; broadcast; identity based; broadcast proxy ... See more keywords
Photo by papaioannou_kostas from unsplash

Burn After Reading: Adaptively Secure Puncturable Identity-Based Proxy Re-Encryption Scheme for Securing Group Message

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3126230

Abstract: Puncturable proxy re-encryption (PPRE) is envisioned to provide secure access control delegation and fine-grained forward security for asynchronous group messaging systems. Nevertheless, the existing PPRE scheme not only suffers from the burden of certificate management… read more here.

Keywords: message; identity based; group; scheme ... See more keywords
Photo by christianw from unsplash

Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Cloud Computing"

DOI: 10.1109/tcc.2020.3042432

Abstract: Homomorphic Proxy Re-Encryption (HPRE) is an extension of Proxy Re-Encryption (PRE) which combines the advantages of both Homomorphic Encryption (HE) and PRE. A HPRE scheme allows arbitrary evaluations to be performed on ciphertexts under one… read more here.

Keywords: homomorphic proxy; hpre; encryption; scheme ... See more keywords
Photo from wikipedia

A Digital Media Subscription Management System Combined with Blockchain and Proxy Re-Encryption Mechanisms

Sign Up to like & get
recommendations!
Published in 2022 at "Symmetry"

DOI: 10.3390/sym14102167

Abstract: The subscription economy was born because the relationship between creators and customers is different than it used to be. The era of the creator economy seems to be filled with boundless promise, but at the… read more here.

Keywords: creator; media subscription; digital media; subscription ... See more keywords