Related references
Note: Only part of the references are listed.Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage
Jiguo Li et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)
Identity-based encryption with authorized equivalence test for cloud-assisted IoT
Rashad Elhabob et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2020)
Privacy-Preserving and Pairing-Free Multirecipient Certificateless Encryption With Keyword Search for Cloud-Assisted IIoT
Lu Yang et al.
IEEE INTERNET OF THINGS JOURNAL (2020)
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation
Shengmin Xu et al.
INFORMATION SCIENCES (2019)
IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT
Hongyang Yan et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)
Privacy-preserving raw data collection without a trusted authority for IoT
Yi-Ning Liu et al.
COMPUTER NETWORKS (2019)
Improved Certificateless Signcryption for IoT Smart Devices
Balasubramanian V. et al.
Applied Mathematics & Information Sciences (2019)
Revocable hierarchical identity-based encryption with shorter private keys and update keys
Kwangsu Lee et al.
DESIGNS CODES AND CRYPTOGRAPHY (2018)
Efficient and Expressive Keyword Search Over Encrypted Data in Cloud
Hui Cui et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2018)
Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things
Mimi Ma et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
Secure Fine-Grained Access Control and Data Sharing for Dynamic Groups in the Cloud
Shengmin Xu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)
DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems
Anmin Fu et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
Privacy-preserving composite modular exponentiation outsourcing with optimal checkability in single untrusted cloud server
Anmin Fu et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
Efficient revocable identity-based encryption via subset difference methods
Kwangsu Lee et al.
DESIGNS CODES AND CRYPTOGRAPHY (2017)
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing
Jiguo Li et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)
Cloud-assisted Industrial Internet of Things (IIoT) - Enabled framework for health monitoring
M. Shamim Hossain et al.
COMPUTER NETWORKS (2016)
Fully secure fuzzy identity-based encryption for secure IoT communications
Yijun Mao et al.
COMPUTER STANDARDS & INTERFACES (2016)
An Efficient Searchable Encryption Against Keyword Guessing Attacks for Sharable Electronic Medical Records in Cloud-based System
Yilun Wu et al.
JOURNAL OF MEDICAL SYSTEMS (2016)
Server-Aided Revocable Identity-Based Encryption from Lattices
Khoa Nguyen et al.
CRYPTOLOGY AND NETWORK SECURITY, CANS 2016 (2016)
A lightweight attribute-based encryption scheme for the Internet of Things
Xuanxia Yao et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2015)
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Jin Li et al.
IEEE TRANSACTIONS ON COMPUTERS (2015)
Efficient revocable certificateless encryption against decryption key exposure
Yinxia Sun et al.
IET INFORMATION SECURITY (2015)
Server-Aided Revocable Identity-Based Encryption
Baodong Qin et al.
COMPUTER SECURITY - ESORICS 2015, PT I (2015)
Internet of Things in Industries: A Survey
Li Da Xu et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2014)
Efficient Revocable ID-Based Encryption with a Public Channel
Yuh-Min Tseng et al.
COMPUTER JOURNAL (2012)