Search Results - "Zhenfu Cao"

Refine Results
  1. 1

    Auditable \sigma -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing by Ning, Jianting, Cao, Zhenfu, Dong, Xiaolei, Liang, Kaitai, Ma, Hui, Wei, Lifei

    “…As a sophisticated mechanism for secure finegrained access control over encrypted data, ciphertext-policy attribute-based encryption (CP-ABE) is one of the…”
    Get full text
    Journal Article
  2. 2

    Security and privacy for storage and computation in cloud computing by Wei, Lifei, Zhu, Haojin, Cao, Zhenfu, Dong, Xiaolei, Jia, Weiwei, Chen, Yunlu, Vasilakos, Athanasios V.

    Published in Information sciences (10-02-2014)
    “…Cloud computing emerges as a new computing paradigm that aims to provide reliable, customized and quality of service guaranteed computation environments for…”
    Get full text
    Journal Article
  3. 3

    White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes by Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei, Xiaodong Lin

    “…Ciphertext-policy attribute-based encryption (CP-ABE) enables fine-grained access control to the encrypted data for commercial applications. There has been…”
    Get full text
    Journal Article
  4. 4

    PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems by Zhou, Jun, Cao, Zhenfu, Dong, Xiaolei, Lin, Xiaodong

    “…E-healthcare systems have been increasingly facilitating health condition monitoring, disease modeling and early intervention, and evidence-based medical…”
    Get full text
    Journal Article
  5. 5

    A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks by Zhu, Haojin, Du, Suguo, Gao, Zhaoyu, Dong, Mianxiong, Cao, Zhenfu

    “…Malicious and selfish behaviors represent a serious threat against routing in delay/disruption tolerant networks (DTNs). Due to the unique network…”
    Get full text
    Journal Article
  6. 6

    Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs by Jun Zhou, Xiaolei Dong, Zhenfu Cao, Vasilakos, Athanasios V.

    “…Cloud-assisted vehicular delay tolerant networks (DTNs) have been utilized in wide-ranging applications where a continuous end-to-end connection is…”
    Get full text
    Journal Article
  7. 7

    Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions by Zhou, Jun, Cao, Zhenfu, Dong, Xiaolei, Lin, Xiaodong

    Published in IEEE wireless communications (01-04-2015)
    “…Cloud-assisted wireless wearable communications have been increasingly pervasive with the profound development of sensor, wireless communication, and cloud…”
    Get full text
    Journal Article
  8. 8

    White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures by Zhen Liu, Zhenfu Cao, Wong, D. S.

    “…In a ciphertext-policy attribute-based encryption (CP-ABE) system, decryption keys are defined over attributes shared by multiple users. Given a decryption…”
    Get full text
    Journal Article
  9. 9

    Two Secure and Efficient Lightweight Data Aggregation Schemes for Smart Grid by Qian, Jiawei, Cao, Zhenfu, Dong, Xiaolei, Shen, Jiachen, Liu, Zhusen, Ye, Yunxiu

    Published in IEEE transactions on smart grid (01-05-2021)
    “…It is a challenging issue in smart grid to provide flexible and efficient data aggregation and at the same time maintain data integrity and data privacy. To…”
    Get full text
    Journal Article
  10. 10

    Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild by Zhen Liu, Zhenfu Cao, Wong, Duncan S.

    “…In Ciphertext-policy attribute-based encrypt- ion (CP-ABE), ciphertexts are associated with access policies, which do not have to contain the identities of…”
    Get full text
    Journal Article
  11. 11

    Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds by Hu, Huidan, Cao, Zhenfu, Dong, Xiaolei

    Published in IEEE access (2022)
    “…Cloud computing with massive storage and computing capabilities has become widespread in actual applications. It is critical to ensure secure data sharing in…”
    Get full text
    Journal Article
  12. 12

    Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid by Jia, Weiwei, Zhu, Haojin, Cao, Zhenfu, Dong, Xiaolei, Xiao, Chengxin

    Published in IEEE systems journal (01-06-2014)
    “…Privacy-preserving metering aggregation is regarded as an important research topic in securing a smart grid. In this paper, we first identify and formalize a…”
    Get full text
    Journal Article
  13. 13

    IPO-PEKS: Effective Inner Product Outsourcing Public Key Searchable Encryption from Lattice in the IoT by Wang, Miao, Sun, Liwang, Cao, Zhenfu, Dong, Xiaolei

    Published in IEEE access (01-01-2024)
    “…Lightweight devices in the Internet of Things (IoT) typically need to store massive data on a cloud server with strong processing and storage capabilities for…”
    Get full text
    Journal Article
  14. 14

    Securing m-healthcare social networks: challenges, countermeasures and future directions by Jun Zhou, Zhenfu Cao, Xiaolei Dong, Xiaodong Lin, Vasilakos, Athanasios V.

    Published in IEEE wireless communications (01-08-2013)
    “…M-healthcare mobile social network has emerged as a promising next-generation healthcare system increasingly adopted by the US and European governments, with…”
    Get full text
    Journal Article
  15. 15

    Designated server-aided revocable identity-based keyword search on lattice by Guo, Ying, Meng, Fei, Cheng, Leixiao, Dong, Xiaolei, Cao, Zhenfu

    “…Public key encryption scheme with keyword search is a promising technique supporting search on encrypted data without leaking any information about the…”
    Get full text
    Journal Article
  16. 16

    Secure threshold multi authority attribute based encryption without a central authority by Lin, Huang, Cao, Zhenfu, Liang, Xiaohui, Shao, Jun

    Published in Information sciences (01-07-2010)
    “…An attribute based encryption scheme (ABE) is a cryptographic primitive in which every user is identified by a set of attributes, and some function of these…”
    Get full text
    Journal Article
  17. 17

    A novel and efficient unlinkable secret handshakes scheme by Huang, Hai, Cao, Zhenfu

    Published in IEEE communications letters (01-05-2009)
    “…An unlinkable secret handshakes is a two-party authentication protocol which protects the privacy of parties' affiliation and identity to everyone except for…”
    Get full text
    Journal Article
  18. 18

    On the anonymity of some authentication schemes for wireless communications by Zeng, P., Cao, Z., Choo, K.-K.R., Wang, S.

    Published in IEEE communications letters (01-03-2009)
    “…In 2004, Zhu and Ma proposed a new and efficient authentication scheme claiming to provide anonymity for wireless environments. Two years later, Lee et al…”
    Get full text
    Journal Article
  19. 19

    Extended Galbraith’s test on the anonymity of IBE schemes from higher residuosity by Zhao, Xiaopeng, Cao, Zhenfu, Dong, Xiaolei, Shao, Jun

    Published in Designs, codes, and cryptography (01-02-2021)
    “…At PKC 2019, Clear and McGoldrick presented the first identity-based encryption (IBE) scheme that is group homomorphic for addition modulo a poly-sized prime e…”
    Get full text
    Journal Article
  20. 20

    AIOL: An Improved Orthogonal Lattice Algorithm for the General Approximate Common Divisor Problem by Ran, Yinxia, Pan, Yun, Wang, Licheng, Cao, Zhenfu

    Published in Mathematics (Basel) (01-12-2023)
    “…The security of several fully homomorphic encryption (FHE) schemes depends on the intractability assumption of the approximate common divisor (ACD) problem…”
    Get full text
    Journal Article