期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Evolve and Revoke:A Secure and Efficient Conditional Proxy Re-Encryption Scheme with Ciphertext Evolution
1
作者 Han-Yu Lin Tung-Tso Tsai Yi-Jia Ye 《Computers, Materials & Continua》 2026年第4期1565-1583,共19页
Cloud data sharing is an important issue in modern times.To maintain the privacy and confidentiality of data stored in the cloud,encryption is an inevitable process before uploading the data.However,the centralized ma... Cloud data sharing is an important issue in modern times.To maintain the privacy and confidentiality of data stored in the cloud,encryption is an inevitable process before uploading the data.However,the centralized management and transmission latency of the cloud makes it difficult to support real-time processing and distributed access structures.As a result,fog computing and the Internet of Things(IoT)have emerged as crucial applications.Fog-assisted proxy re-encryption is a commonly adopted technique for sharing cloud ciphertexts.It allows a semitrusted proxy to transforma data owner’s ciphertext into another re-encrypted ciphertext intended for a data requester,without compromising any information about the original ciphertext.Yet,the user revocation and cloud ciphertext renewal problems still lack effective and secure mechanisms.Motivated by it,we propose a revocable conditional proxy re-encryption scheme offering ciphertext evolution(R-CPRE-CE).In particular,a periodically updated time key is used to revoke the user’s access privileges while an access condition prevents a malicious proxy from reencrypting unauthorized ciphertext.We also demonstrate that our scheme is provably secure under the notion of indistinguishability against adaptively chosen identity and chosen ciphertext attacks in the random oracle model.Performance analysis shows that our scheme reduces the computation time for a complete data access cycle from an initial query to the final decryption by approximately 47.05%compared to related schemes. 展开更多
关键词 REVOCABLE proxy re-encryption conditional access control ciphertext evolution fog computing
在线阅读 下载PDF
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
2
作者 Xixi Yan Jing Zhang Pengyu Cheng 《Computers, Materials & Continua》 2025年第4期1399-1414,共16页
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribute-based conditional proxy re-encryption(AB-CPRE)schemes proposed so far do not take into account the importance of user attributes.A weighted attribute-based conditional proxy re-encryption(WAB-CPRE)scheme is thus designed to provide more precise decryption rights delegation.By introducing the concept of weight attributes,the quantity of system attributes managed by the server is reduced greatly.At the same time,a weighted tree structure is constructed to simplify the expression of access structure effectively.With conditional proxy re-encryption,large amounts of data and complex computations are outsourced to cloud servers,so the data owner(DO)can revoke the user’s decryption rights directly with minimal costs.The scheme proposed achieves security against chosen plaintext attacks(CPA).Experimental simulation results demonstrated that the decryption time is within 6–9 ms,and it has a significant reduction in communication and computation cost on the user side with better functionality compared to other related schemes,which enables users to access cloud data on devices with limited resources. 展开更多
关键词 Cloud service conditional proxy re-encryption user revocation weighted attribute
在线阅读 下载PDF
Privacy-preserving pathological data sharing among multiple remote parties
3
作者 Wei Wu Fulong Chen +7 位作者 Pinghai Yuan Taochun Wang Dong Xie Chuanxin Zhao Chao Wang Detao Tang Jingtao Li Ji Zhang 《Blockchain(Research and Applications)》 EI 2024年第3期67-77,共11页
The sharing of pathological data is highly important in various applications,such as remote diagnosis,graded diagnosis,illness treatment,and specialist system development.However,ensuring reliable,secure,privacy-prese... The sharing of pathological data is highly important in various applications,such as remote diagnosis,graded diagnosis,illness treatment,and specialist system development.However,ensuring reliable,secure,privacy-preserving,and efficient sharing of pathological data poses significant challenges.This paper presents a novel solution that leverages blockchain technology to ensure reliability in pathological data sharing.Additionally,it employs conditional proxy re-encryption(C-PRE)and public key encryption with equality test technology to control the scope and preserve the privacy of shared data.To assess the practicality of our solution,we implemented a prototype system using Hyperledger Fabric and conducted evaluations with various metrics.We also compared the solution with relevant schemes.The results demonstrate that the proposed solution effectively meets the requirements for pathological data sharing and is practical in production scenarios. 展开更多
关键词 Digital remote pathology conditional proxy re-encryption Blockchain Data storage Data sharing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部