4.7 Article

A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Privacy-Preserving Task Recommendation Services for Crowdsourcing

Jiangang Shu et al.

Summary: This paper proposes a privacy-preserving task recommendation scheme (PPTR) for crowdsourcing, which protects both task privacy and worker privacy by utilizing polynomial functions and matrix decomposition for multi-keyword matching. User accountability and revocation are effectively achieved through PPTR. Extensive privacy analysis and performance evaluations demonstrate that PPTR is secure and efficient.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Article Computer Science, Hardware & Architecture

Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness

Chengjun Cai et al.

Summary: By leveraging blockchain technology, decentralized storage and encrypted search functionality have been implemented to address issues such as service integrity and threats in the ecosystem, ensuring the reliability of the sharing economy platform.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Review Computer Science, Information Systems

Blockchain for Internet of Energy management: Review, solutions, and challenges

Arzoo Miglani et al.

COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Group public key encryption with equality test against offline message recovery attack

Yunhao Ling et al.

INFORMATION SCIENCES (2020)

Article Computer Science, Information Systems

HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes

Chao Lin et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Engineering, Electrical & Electronic

Toward Keyword Extraction in Constrained Information Retrieval in Vehicle Social Network

Zhen Yang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Computer Science, Information Systems

BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system

Rajat Chaudhary et al.

COMPUTERS & SECURITY (2019)

Review Computer Science, Hardware & Architecture

Blockchain for smart communities: Applications, challenges and opportunities

Shubhani Aggarwal et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Review Computer Science, Hardware & Architecture

A survey on privacy protection in blockchain system

Qi Feng et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Computer Science, Hardware & Architecture

A Blockchain-Based Privacy-Preserving Authentication Scheme for VANETs

Zhaojun Lu et al.

IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS (2019)

Proceedings Paper Computer Science, Information Systems

A Lattice-Based Public Key Encryption with Equality Test in Standard Model

Dung Hoang Duong et al.

INFORMATION SECURITY AND PRIVACY, ACISP 2019 (2019)

Article Computer Science, Information Systems

BPTM: Blockchain-Based Privacy-Preserving Task Matching in Crowdsourcing

Yiming Wu et al.

IEEE ACCESS (2019)

Article Automation & Control Systems

Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks

Peng Xu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Theory & Methods

Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage

Cong Zuo et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Engineering, Civil

CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles

Lun Li et al.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2018)

Article Computer Science, Hardware & Architecture

BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0

Chao Lin et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Information Systems

Anonymous Privacy-Preserving Task Matching in Crowdsourcing

Jiangang Shu et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Computer Science, Hardware & Architecture

Branch based blockchain technology in intelligent vehicle

Madhusudan Singh et al.

COMPUTER NETWORKS (2018)

Proceedings Paper Computer Science, Software Engineering

Practical Revocation and Key Rotation

Steven Myers et al.

TOPICS IN CRYPTOLOGY - CT-RSA 2018 (2018)

Article Computer Science, Theory & Methods

Efficient and secure identity-based encryption scheme with equality test in cloud computing

Libing Wu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Computer Science, Information Systems

An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks

Qiong Huang et al.

INFORMATION SCIENCES (2017)

Article Computer Science, Theory & Methods

Searchable Symmetric Encryption: Designs and Challe

Geong Sen Poh et al.

ACM COMPUTING SURVEYS (2017)

Article Computer Science, Theory & Methods

A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds

Yang Lu et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)

Article Computer Science, Information Systems

Identity-based encryption with outsourced equality test in cloud computing

Sha Ma

INFORMATION SCIENCES (2016)

Article Computer Science, Theory & Methods

Bayesian Coalition Game for Contention-Aware Reliable Data Forwarding in Vehicular Mobile Cloud

Neeraj Kumar et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2015)

Article Computer Science, Theory & Methods

Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization

Sha Ma et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Coalition Games for Spatio-Temporal Big Data in Internet of Vehicles Environment: A Comparative Analysis

Neeraj Kumar et al.

IEEE INTERNET OF THINGS JOURNAL (2015)

Article Computer Science, Information Systems

ALCA: agent learning-based clustering algorithm in vehicular ad hoc networks

Neeraj Kumar et al.

PERSONAL AND UBIQUITOUS COMPUTING (2013)

Article Computer Science, Information Systems

Proxy re-encryption with keyword search

Jun Shao et al.

INFORMATION SCIENCES (2010)