Search Results - "Li, Jiguo"
-
1
Key-policy attribute-based encryption against continual auxiliary input leakage
Published in Information sciences (01-01-2019)“…Attribute-based encryption mechanism can achieve very flexible access control, so it has a wide range of applications in the distributed environment, such as…”
Get full text
Journal Article -
2
KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage
Published in IEEE transactions on services computing (01-09-2017)“…Cloud computing becomes increasingly popular for data owners to outsource their data to public cloud servers while allowing intended data users to retrieve…”
Get full text
Journal Article -
3
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage
Published in IEEE transactions on information forensics and security (01-01-2017)“…As an important application in cloud computing, cloud storage offers user scalable, flexible, and high-quality data storage and computation services. A growing…”
Get full text
Journal Article -
4
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
Published in IEEE transactions on services computing (01-09-2017)“…With the development of cloud computing, outsourcing data to cloud server attracts lots of attentions. To guarantee the security and achieve flexibly…”
Get full text
Journal Article -
5
A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds
Published in Future generation computer systems (01-09-2016)“…To assure the confidentiality of the sensitive data stored in public cloud storages, the data owners should encrypt their data before submitting them to the…”
Get full text
Journal Article -
6
Constructing certificateless encryption with keyword search against outside and inside keyword guessing attacks
Published in China communications (01-07-2019)“…Searchable public key encryption is a useful cryptographic paradigm that enables an untrustworthy server to retrieve the encrypted data without revealing the…”
Get full text
Journal Article -
7
Identity-Based Online/Offline Encryption Scheme from LWE
Published in Information (Basel) (01-09-2024)“…With quantum computers, the quantum resistance of cryptographic systems has gradually attracted attention. To overcome the shortcoming of existing…”
Get full text
Journal Article -
8
ID-Based Ring Signature against Continual Side Channel Attack
Published in Symmetry (Basel) (01-01-2023)“…The security of the signature scheme is destroyed because its secret information of the signature system is leaked due to the side channel attack. Ring…”
Get full text
Journal Article -
9
Identity-Based and Leakage-Resilient Broadcast Encryption Scheme for Cloud Storage Service
Published in Applied sciences (01-11-2022)“…Cloud storage services are an important application of cloud computing. An increasing number of data owners store their data on cloud platforms. Since cloud…”
Get full text
Journal Article -
10
Anonymous Identity Based Broadcast Encryption against Continual Side Channel Attacks in the State Partition Model
Published in Applied sciences (01-09-2022)“…In the past 10 years, many side-channel attacks have been discovered and exploited one after another by attackers, which have greatly damaged the security of…”
Get full text
Journal Article -
11
Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups
Published in IEEE access (2020)“…Public key encryption with keyword search (PEKS) allows a cloud server to retrieve particular ciphertexts without leaking the contents of the searched…”
Get full text
Journal Article -
12
Constant Size Ciphertext Distributed CP-ABE Scheme With Privacy Protection and Fully Hiding Access Structure
Published in IEEE access (2019)“…In ciphertext-policy attribute-based encryption (CP-ABE) schemes, the computational overhead and the length for the ciphertext are positively correlated with…”
Get full text
Journal Article -
13
SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search
Published in IEEE access (2019)“…Searchable encryption is a novel cryptographic primitive that enables a data storage server to retrieve the data ciphertexts without the knowledge of either…”
Get full text
Journal Article -
14
The Effect of Diabetes Management Shared Care Clinic on Glycated Hemoglobin A1c Compliance and Self-Management Abilities in Patients with Type 2 Diabetes Mellitus
Published in International journal of clinical practice (Esher) (2023)“…Objective. We aim to evaluate the impact of diabetes management shared care clinic (DMSCC) on glycated hemoglobin A1c (HbA1c) compliance and self-management…”
Get full text
Journal Article -
15
Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage
Published in IEEE access (2020)“…Ensuring the integrity of outsourced data is one of several functional requirements in cloud storage services, although designing an effective and secure…”
Get full text
Journal Article -
16
A Dispersed Multi-Value Attribute-Based Encryption With Mediated Obfuscation
Published in IEEE access (2019)“…The Multi-authority attribute-based encryption (MA-ABE) scheme can provide fine-grained data access control in many management domains monitored by different…”
Get full text
Journal Article -
17
Efficient Certificate-Based Signcryption Secure against Public Key Replacement Attacks and Insider Attacks
Published in TheScientificWorld (01-01-2014)“…Signcryption is a useful cryptographic primitive that achieves confidentiality and authentication in an efficient manner. As an extension of signcryption in…”
Get full text
Journal Article -
18
Fuzzy Identity-Based Dynamic Auditing of Big Data on Cloud Storage
Published in IEEE access (2019)“…To ensure the reliability and integrity of data in the cloud storage server, some scholars provided various data integrity auditing schemes. However, the most…”
Get full text
Journal Article -
19
Hierarchical Trust Level Evaluation for Pervasive Social Networking
Published in IEEE access (2017)“…Pervasive social networking (PSN) is a fundamental infrastructure in social networking that has played an important role in not only the Internet but also…”
Get full text
Journal Article -
20
A New Efficient Certificate‐Based Signature Scheme
Published in Chinese Journal of Electronics (01-10-2015)“…Certificate‐based cryptography is a new kind of public key algorithm, which combines the merits of traditional Public key infrastructure (PKI) and identitybased…”
Get full text
Journal Article