4.8 Article

Efficient Identity-Based Encryption With Revocation for Data Privacy in Internet of Things

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage

Jiguo Li et al.

Summary: Cloud storage service offers an efficient way for data sharing within a group, but ensuring data integrity requires RDPC protocols. Traditional PKI-based RDPC protocols have security flaws and certificate management burden, leading to the adoption of IBC for its basis, despite the key escrow issue. To address these challenges, a new RDPC protocol is proposed using certificateless signature technique to eliminate the need for certificates and key escrow problems.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Article Computer Science, Information Systems

Identity-based encryption with authorized equivalence test for cloud-assisted IoT

Rashad Elhabob et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2020)

Article Computer Science, Information Systems

Privacy-Preserving and Pairing-Free Multirecipient Certificateless Encryption With Keyword Search for Cloud-Assisted IIoT

Lu Yang et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation

Shengmin Xu et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Theory & Methods

IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT

Hongyang Yan et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Hardware & Architecture

Privacy-preserving raw data collection without a trusted authority for IoT

Yi-Ning Liu et al.

COMPUTER NETWORKS (2019)

Article

Improved Certificateless Signcryption for IoT Smart Devices

Balasubramanian V. et al.

Applied Mathematics & Information Sciences (2019)

Article Computer Science, Theory & Methods

Revocable hierarchical identity-based encryption with shorter private keys and update keys

Kwangsu Lee et al.

DESIGNS CODES AND CRYPTOGRAPHY (2018)

Article Computer Science, Hardware & Architecture

Efficient and Expressive Keyword Search Over Encrypted Data in Cloud

Hui Cui et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)

Article Automation & Control Systems

Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things

Mimi Ma et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Theory & Methods

Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud

Shengmin Xu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Hardware & Architecture

DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems

Anmin Fu et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Hardware & Architecture

Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server

Anmin Fu et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Theory & Methods

Efficient revocable identity-based encryption via subset difference methods

Kwangsu Lee et al.

DESIGNS CODES AND CRYPTOGRAPHY (2017)

Article Computer Science, Information Systems

Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing

Jiguo Li et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)

Article Computer Science, Hardware & Architecture

Cloud-assisted Industrial Internet of Things (IIoT) - Enabled framework for health monitoring

M. Shamim Hossain et al.

COMPUTER NETWORKS (2016)

Article Computer Science, Hardware & Architecture

Fully secure fuzzy identity-based encryption for secure IoT communications

Yijun Mao et al.

COMPUTER STANDARDS & INTERFACES (2016)

Proceedings Paper Computer Science, Information Systems

Server-Aided Revocable Identity-Based Encryption from Lattices

Khoa Nguyen et al.

CRYPTOLOGY AND NETWORK SECURITY, CANS 2016 (2016)

Article Computer Science, Theory & Methods

A lightweight attribute-based encryption scheme for the Internet of Things

Xuanxia Yao et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2015)

Article Computer Science, Hardware & Architecture

Identity-Based Encryption with Outsourced Revocation in Cloud Computing

Jin Li et al.

IEEE TRANSACTIONS ON COMPUTERS (2015)

Article Computer Science, Information Systems

Efficient revocable certificateless encryption against decryption key exposure

Yinxia Sun et al.

IET INFORMATION SECURITY (2015)

Proceedings Paper Computer Science, Information Systems

Server-Aided Revocable Identity-Based Encryption

Baodong Qin et al.

COMPUTER SECURITY - ESORICS 2015, PT I (2015)

Article Automation & Control Systems

Internet of Things in Industries: A Survey

Li Da Xu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)

Article Computer Science, Hardware & Architecture

Efficient Revocable ID-Based Encryption with a Public Channel

Yuh-Min Tseng et al.

COMPUTER JOURNAL (2012)