Search Results - "Zhenfu Cao"
-
1
Auditable \sigma -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
Published in IEEE transactions on information forensics and security (01-01-2018)“…As a sophisticated mechanism for secure finegrained access control over encrypted data, ciphertext-policy attribute-based encryption (CP-ABE) is one of the…”
Get full text
Journal Article -
2
Security and privacy for storage and computation in cloud computing
Published in Information sciences (10-02-2014)“…Cloud computing emerges as a new computing paradigm that aims to provide reliable, customized and quality of service guaranteed computation environments for…”
Get full text
Journal Article -
3
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes
Published in IEEE transactions on information forensics and security (01-06-2015)“…Ciphertext-policy attribute-based encryption (CP-ABE) enables fine-grained access control to the encrypted data for commercial applications. There has been…”
Get full text
Journal Article -
4
PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems
Published in IEEE journal of selected topics in signal processing (01-10-2015)“…E-healthcare systems have been increasingly facilitating health condition monitoring, disease modeling and early intervention, and evidence-based medical…”
Get full text
Journal Article -
5
A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks
Published in IEEE transactions on parallel and distributed systems (01-01-2014)“…Malicious and selfish behaviors represent a serious threat against routing in delay/disruption tolerant networks (DTNs). Due to the unique network…”
Get full text
Journal Article -
6
Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs
Published in IEEE transactions on information forensics and security (01-06-2015)“…Cloud-assisted vehicular delay tolerant networks (DTNs) have been utilized in wide-ranging applications where a continuous end-to-end connection is…”
Get full text
Journal Article -
7
Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions
Published in IEEE wireless communications (01-04-2015)“…Cloud-assisted wireless wearable communications have been increasingly pervasive with the profound development of sensor, wireless communication, and cloud…”
Get full text
Journal Article -
8
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures
Published in IEEE transactions on information forensics and security (01-01-2013)“…In a ciphertext-policy attribute-based encryption (CP-ABE) system, decryption keys are defined over attributes shared by multiple users. Given a decryption…”
Get full text
Journal Article -
9
Two Secure and Efficient Lightweight Data Aggregation Schemes for Smart Grid
Published in IEEE transactions on smart grid (01-05-2021)“…It is a challenging issue in smart grid to provide flexible and efficient data aggregation and at the same time maintain data integrity and data privacy. To…”
Get full text
Journal Article -
10
Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild
Published in IEEE transactions on information forensics and security (01-01-2015)“…In Ciphertext-policy attribute-based encrypt- ion (CP-ABE), ciphertexts are associated with access policies, which do not have to contain the identities of…”
Get full text
Journal Article -
11
Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds
Published in IEEE access (2022)“…Cloud computing with massive storage and computing capabilities has become widespread in actual applications. It is critical to ensure secure data sharing in…”
Get full text
Journal Article -
12
Human-Factor-Aware Privacy-Preserving Aggregation in Smart Grid
Published in IEEE systems journal (01-06-2014)“…Privacy-preserving metering aggregation is regarded as an important research topic in securing a smart grid. In this paper, we first identify and formalize a…”
Get full text
Journal Article -
13
IPO-PEKS: Effective Inner Product Outsourcing Public Key Searchable Encryption from Lattice in the IoT
Published in IEEE access (01-01-2024)“…Lightweight devices in the Internet of Things (IoT) typically need to store massive data on a cloud server with strong processing and storage capabilities for…”
Get full text
Journal Article -
14
Securing m-healthcare social networks: challenges, countermeasures and future directions
Published in IEEE wireless communications (01-08-2013)“…M-healthcare mobile social network has emerged as a promising next-generation healthcare system increasingly adopted by the US and European governments, with…”
Get full text
Journal Article -
15
Designated server-aided revocable identity-based keyword search on lattice
Published in EURASIP journal on wireless communications and networking (06-09-2021)“…Public key encryption scheme with keyword search is a promising technique supporting search on encrypted data without leaking any information about the…”
Get full text
Journal Article -
16
Secure threshold multi authority attribute based encryption without a central authority
Published in Information sciences (01-07-2010)“…An attribute based encryption scheme (ABE) is a cryptographic primitive in which every user is identified by a set of attributes, and some function of these…”
Get full text
Journal Article -
17
A novel and efficient unlinkable secret handshakes scheme
Published in IEEE communications letters (01-05-2009)“…An unlinkable secret handshakes is a two-party authentication protocol which protects the privacy of parties' affiliation and identity to everyone except for…”
Get full text
Journal Article -
18
On the anonymity of some authentication schemes for wireless communications
Published in IEEE communications letters (01-03-2009)“…In 2004, Zhu and Ma proposed a new and efficient authentication scheme claiming to provide anonymity for wireless environments. Two years later, Lee et al…”
Get full text
Journal Article -
19
Extended Galbraith’s test on the anonymity of IBE schemes from higher residuosity
Published in Designs, codes, and cryptography (01-02-2021)“…At PKC 2019, Clear and McGoldrick presented the first identity-based encryption (IBE) scheme that is group homomorphic for addition modulo a poly-sized prime e…”
Get full text
Journal Article -
20
AIOL: An Improved Orthogonal Lattice Algorithm for the General Approximate Common Divisor Problem
Published in Mathematics (Basel) (01-12-2023)“…The security of several fully homomorphic encryption (FHE) schemes depends on the intractability assumption of the approximate common divisor (ACD) problem…”
Get full text
Journal Article