Zobrazeno 1 - 10
of 134
pro vyhledávání: '"Raylin Tso"'
Publikováno v:
IET Information Security, Vol 2024 (2024)
The emergence of cloud computing enables users to upload data to remote clouds and compute them. This drastically reduces computing and storage costs for users. Considering secure computing for multilevel users in enterprises, the notion of hierarchi
Externí odkaz:
https://doaj.org/article/e4d3f3522566470c841a65c43f5d40cd
Publikováno v:
IET Information Security, Vol 16, Iss 2, Pp 111-126 (2022)
Abstract Identity‐based encryption (IBE), introduced by Shamir, eliminates the need for public‐key infrastructure. The sender can simply encrypt a message by using the recipient's identity (such as email or IP address) without needing to look up
Externí odkaz:
https://doaj.org/article/49368aa61f5642158db101d2d487d6da
Publikováno v:
IEEE Access, Vol 8, Pp 152551-152564 (2020)
Chen et al. indicated the inner keyword guessing attack coming from the low entropy of keywords, which eliminates the semantic security of most keyword search schemes. Then, they accordingly propose the first dual-server PEKS scheme (abbreviated as D
Externí odkaz:
https://doaj.org/article/b18479399f794001841011a08487f181
Publikováno v:
IEEE Access, Vol 7, Pp 182916-182923 (2019)
Blind multisignature (BMS), first introduced by Horster et al, constitutes a crucial primitive that allows a user to generate a signature of a message from multiple signers, while the signers cannot obtain any information about the message. With thes
Externí odkaz:
https://doaj.org/article/a22e2136fa3145bead0a1efc81aea2de
Publikováno v:
IEEE Access, Vol 6, Pp 63624-63634 (2018)
In the era of cloud computing, the cloud server always plays a significant role to carry the heavy tasks of computation. As for storage services, it provides an efficient manner for accessing data. For data privacy, encryption is usually referred to
Externí odkaz:
https://doaj.org/article/1998b594652a441ea03b1dd869ceb099
Publikováno v:
Applied Sciences, Vol 10, Iss 23, p 8669 (2020)
Inner product encryption, first introduced by Katz et al., is a type of predicate encryption in which a ciphertext and a private key correspond to an attribute vector and a predicate vector, respectively. Only if the attribute and predicate vectors s
Externí odkaz:
https://doaj.org/article/9a9934258a7943f2a0ce14ebf1888d33
Autor:
Raylin Tso
Publikováno v:
Symmetry, Vol 10, Iss 12, p 685 (2018)
With the developments of mobile communications, M-commerce has become increasingly popular in recent years. However, most M-commerce schemes ignore user anonymity during online transactions. As a result, user transactions may easily be traced by shop
Externí odkaz:
https://doaj.org/article/0bd6355d0165448fb52ad43a9a38834f
Publikováno v:
IEEE Systems Journal. 16:4629-4640
In the era of cloud computing, massive quantities of data are encrypted and uploaded to the cloud to realize a variety of applications and services while protecting user confidentiality. Accordingly, the formulation of methods for efficiently searchi
Publikováno v:
IET Information Security, Vol 16, Iss 2, Pp 111-126 (2022)
Identity‐based encryption (IBE), introduced by Shamir, eliminates the need for public‐key infrastructure. The sender can simply encrypt a message by using the recipient's identity (such as email or IP address) without needing to look up the publi
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783031293702
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::46967adc8275a3fcd437e6d86e5658fa
https://doi.org/10.1007/978-3-031-29371-9_8
https://doi.org/10.1007/978-3-031-29371-9_8