Search Results - "Li, Jiguo"

Refine Results
  1. 1

    Key-policy attribute-based encryption against continual auxiliary input leakage by Li, Jiguo, Yu, Qihong, Zhang, Yichen, Shen, Jian

    Published in Information sciences (01-01-2019)
    “…Attribute-based encryption mechanism can achieve very flexible access control, so it has a wide range of applications in the distributed environment, such as…”
    Get full text
    Journal Article
  2. 2

    KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage by Li, Jiguo, Lin, Xiaonan, Zhang, Yichen, Han, Jinguang

    Published in IEEE transactions on services computing (01-09-2017)
    “…Cloud computing becomes increasingly popular for data owners to outsource their data to public cloud servers while allowing intended data users to retrieve…”
    Get full text
    Journal Article
  3. 3

    A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage by Yan, Hao, Li, Jiguo, Han, Jinguang, Zhang, Yichen

    “…As an important application in cloud computing, cloud storage offers user scalable, flexible, and high-quality data storage and computation services. A growing…”
    Get full text
    Journal Article
  4. 4

    Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing by Li, Jiguo, Yao, Wei, Zhang, Yichen, Qian, Huiling, Han, Jinguang

    Published in IEEE transactions on services computing (01-09-2017)
    “…With the development of cloud computing, outsourcing data to cloud server attracts lots of attentions. To guarantee the security and achieve flexibly…”
    Get full text
    Journal Article
  5. 5

    A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds by Lu, Yang, Li, Jiguo

    Published in Future generation computer systems (01-09-2016)
    “…To assure the confidentiality of the sensitive data stored in public cloud storages, the data owners should encrypt their data before submitting them to the…”
    Get full text
    Journal Article
  6. 6

    Constructing certificateless encryption with keyword search against outside and inside keyword guessing attacks by Lu, Yang, Li, Jiguo

    Published in China communications (01-07-2019)
    “…Searchable public key encryption is a useful cryptographic paradigm that enables an untrustworthy server to retrieve the encrypted data without revealing the…”
    Get full text
    Journal Article
  7. 7

    Identity-Based Online/Offline Encryption Scheme from LWE by Zuo, Binger, Li, Jiguo, Zhang, Yichen, Shen, Jian

    Published in Information (Basel) (01-09-2024)
    “…With quantum computers, the quantum resistance of cryptographic systems has gradually attracted attention. To overcome the shortcoming of existing…”
    Get full text
    Journal Article
  8. 8

    ID-Based Ring Signature against Continual Side Channel Attack by Yu, Qihong, Li, Jiguo, Shen, Jian

    Published in Symmetry (Basel) (01-01-2023)
    “…The security of the signature scheme is destroyed because its secret information of the signature system is leaked due to the side channel attack. Ring…”
    Get full text
    Journal Article
  9. 9

    Identity-Based and Leakage-Resilient Broadcast Encryption Scheme for Cloud Storage Service by Yu, Qihong, Li, Jiguo, Ji, Sai

    Published in Applied sciences (01-11-2022)
    “…Cloud storage services are an important application of cloud computing. An increasing number of data owners store their data on cloud platforms. Since cloud…”
    Get full text
    Journal Article
  10. 10

    Anonymous Identity Based Broadcast Encryption against Continual Side Channel Attacks in the State Partition Model by Yu, Qihong, Li, Jiguo, Ji, Sai

    Published in Applied sciences (01-09-2022)
    “…In the past 10 years, many side-channel attacks have been discovered and exploited one after another by attackers, which have greatly damaged the security of…”
    Get full text
    Journal Article
  11. 11

    Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups by Shen, Chen, Lu, Yang, Li, Jiguo

    Published in IEEE access (2020)
    “…Public key encryption with keyword search (PEKS) allows a cloud server to retrieve particular ciphertexts without leaking the contents of the searched…”
    Get full text
    Journal Article
  12. 12

    Constant Size Ciphertext Distributed CP-ABE Scheme With Privacy Protection and Fully Hiding Access Structure by Zhang, Yichen, Li, Jiguo, Yan, Hao

    Published in IEEE access (2019)
    “…In ciphertext-policy attribute-based encryption (CP-ABE) schemes, the computational overhead and the length for the ciphertext are positively correlated with…”
    Get full text
    Journal Article
  13. 13

    SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search by Lu, Yang, Li, Jiguo, Zhang, Yichen

    Published in IEEE access (2019)
    “…Searchable encryption is a novel cryptographic primitive that enables a data storage server to retrieve the data ciphertexts without the knowledge of either…”
    Get full text
    Journal Article
  14. 14
  15. 15

    Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage by Wang, Feng, Xu, Li, Choo, Kim-Kwang Raymond, Zhang, Yuexin, Wang, Huaqun, Li, Jiguo

    Published in IEEE access (2020)
    “…Ensuring the integrity of outsourced data is one of several functional requirements in cloud storage services, although designing an effective and secure…”
    Get full text
    Journal Article
  16. 16

    A Dispersed Multi-Value Attribute-Based Encryption With Mediated Obfuscation by Hu, Shengzhou, Li, Jiguo, Zhang, Yichen

    Published in IEEE access (2019)
    “…The Multi-authority attribute-based encryption (MA-ABE) scheme can provide fine-grained data access control in many management domains monitored by different…”
    Get full text
    Journal Article
  17. 17

    Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks by Lu, Yang, Li, Jiguo

    Published in TheScientificWorld (01-01-2014)
    “…Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in…”
    Get full text
    Journal Article
  18. 18

    Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage by Zhao, Chenbin, Xu, Li, Li, Jiguo, Wang, Feng, Fang, He

    Published in IEEE access (2019)
    “…To ensure the reliability and integrity of data in the cloud storage server, some scholars provided various data integrity auditing schemes. However, the most…”
    Get full text
    Journal Article
  19. 19

    Hierarchical Trust Level Evaluation for Pervasive Social Networking by Shen, Jian, Zhou, Tianqi, Lai, Chin-Feng, Li, Jiguo, Li, Xiong

    Published in IEEE access (2017)
    “…Pervasive social networking (PSN) is a fundamental infrastructure in social networking that has played an important role in not only the Internet but also…”
    Get full text
    Journal Article
  20. 20

    A New Efficient Certificate‐Based Signature Scheme by Zhang, Yichen, Li, Jiguo, Wang, Zhiwei, Yao, Wei

    Published in Chinese Journal of Electronics (01-10-2015)
    “…Certificate‐based cryptography is a new kind of public key algorithm, which combines the merits of traditional Public key infrastructure (PKI) and identitybased…”
    Get full text
    Journal Article