4.7 Article

MBP: Multi-channel broadcast proxy re-encryption for cloud-based IoT devices

Related references

Note: Only part of the references are listed.
Article Computer Science, Theory & Methods

Identity-Based Broadcast Proxy Re-Encryption for Flexible Data Sharing in VANETs

Jing Zhang et al.

Summary: This study proposes an identity-based broadcast proxy re-encryption scheme to achieve flexible and efficient data sharing in vehicular ad hoc networks. The data sender generates a fixed ciphertext that can be obtained by newly added vehicles through authorized vehicles. Data receivers can decrypt ciphertext directly without knowing the identities of other receivers, and the decryption overhead is constant. In addition, the scheme achieves complete anonymous data sharing to protect vehicle privacy.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2023)

Article Computer Science, Information Systems

A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain

Kwame Opuni-Boachie Obour Agyekum et al.

Summary: This article proposes a proxy re-encryption approach to secure data sharing in cloud environments, ensuring data confidentiality, integrity, and security. It utilizes information-centric networking and blockchain technology to improve service quality and achieve decentralization in data sharing.

IEEE SYSTEMS JOURNAL (2022)

Article Computer Science, Information Systems

Blockchain-Based Digital Rights Management Scheme via Multiauthority Ciphertext-Policy Attribute-Based Encryption and Proxy Re-Encryption

Juntao Gao et al.

Summary: The study proposed a blockchain-based digital rights management scheme, utilizing multi-authority ciphertext-policy attribute-based encryption and proxy re-encryption technology to enhance the confidentiality of digital contents, fairness of copyright transactions, and efficiency of copyright owner management.

IEEE SYSTEMS JOURNAL (2021)

Article Computer Science, Hardware & Architecture

Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain

Ahsan Manzoor et al.

Summary: The paper introduces a blockchain-based marketplace for sharing IoT data, utilizing a proxy re-encryption scheme for secure data transmission and sharing to address trust issues. This system is particularly suitable for storing, trading, and managing sensor data, providing efficient, fast, and secure platform capabilities.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2021)

Article Computer Science, Information Systems

An efficient public key secure scheme for cloud and IoT security

Chandrasegar Thirumalai et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Security information transmission algorithms for IoT based on cloud computing

Ding Li et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

GROSE: Optimal group size estimation for broadcast proxy re-encryption

Sumana Maiti et al.

COMPUTER COMMUNICATIONS (2020)

Article Engineering, Electrical & Electronic

P2B: Privacy Preserving Identity-Based Broadcast Proxy Re-Encryption

Sumana Maiti et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Article Computer Science, Information Systems

Hybrid Lightweight Proxy Re-Encryption Scheme for Secure Fog-to-Things Environment

Osama A. Khashan

IEEE ACCESS (2020)

Article Computer Science, Information Systems

A proxy broadcast re-encryption for cloud data sharing

Maosheng Sun et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Artificial Intelligence

IoT device security based on proxy re-encryption

SuHyun Kim et al.

JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING (2018)

Article Computer Science, Theory & Methods

PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks

Qinlong Huang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Theory & Methods

A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption

S. Canard et al.

THEORETICAL COMPUTER SCIENCE (2018)

Article Computer Science, Information Systems

Provably Secure Timed-Release Proxy Conditional Reencryption

Chun-I Fan et al.

IEEE SYSTEMS JOURNAL (2017)

Article Computer Science, Information Systems

SecRBAC: Secure data in the Clouds

Juan M. Marin Perez et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)

Article Computer Science, Information Systems

Dynamic Encrypted Data Sharing Scheme Based on Conditional Proxy Broadcast Re-Encryption for Cloud Storage

Linmei Jiang et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

Mils-Cloud: A Sensor-Cloud-Based Architecture for the Integration of Military Tri-Services Operations and Decision Making

Sudip Misra et al.

IEEE SYSTEMS JOURNAL (2016)

Article Computer Science, Hardware & Architecture

Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email

Peng Xu et al.

IEEE TRANSACTIONS ON COMPUTERS (2016)