Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (234)
  • Open Access

    ARTICLE

    The Development of Proxy Re-Encryption

    Yepeng Liu1, 2, Yongjun Ren1, 2, *, Qirun Wang3, Jinyue Xia4

    Journal of Cyber Security, Vol.2, No.1, pp. 1-8, 2020, DOI:10.32604/jcs.2020.05878

    Abstract With the diversification of electronic devices, cloud-based services have become the link between different devices. As a cryptosystem with secure conversion function, proxy re-encryption enables secure sharing of data in a cloud environment. Proxy re-encryption is a public key encryption system with ciphertext security conversion function. A semi-trusted agent plays the role of ciphertext conversion, which can convert the user ciphertext into the same plaintext encrypted by the principal’s public key. Proxy re-encryption has been a hotspot in the field of information security since it was proposed by Blaze et al. [Blaze, Bleumer and Strauss (1998)]. After 20 years of… More >

  • Open Access

    ARTICLE

    Lattice-Based Searchable Encryption Scheme against Inside Keywords Guessing Attack

    Xiaoling Yu1, Chungen Xu1, *, Lei Xu1, Yuntao Wang2

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 1107-1125, 2020, DOI:10.32604/cmc.2020.09680

    Abstract To save the local storage, users store the data on the cloud server who offers convenient internet services. To guarantee the data privacy, users encrypt the data before uploading them into the cloud server. Since encryption can reduce the data availability, public-key encryption with keyword search (PEKS) is developed to achieve the retrieval of the encrypted data without decrypting them. However, most PEKS schemes cannot resist quantum computing attack, because the corresponding hardness assumptions are some number theory problems that can be solved efficiently under quantum computers. Besides, the traditional PEKS schemes have an inherent security issue that they cannot… More >

  • Open Access

    ARTICLE

    An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme with Policy Update

    Changji Wang1, *, Yuan Yuan2

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 1031-1041, 2020, DOI:10.32604/cmc.2020.06278

    Abstract Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the problem for enforcing fine-grained access control over encrypted data in the cloud. However, when applying CP-ABE to data outsourcing scenarios, we have to address the challenging issue of policy updates because access control elements, such as users, attributes, and access rules may change frequently. In this paper, we propose a notion of access policy updatable ciphertext-policy attribute-based encryption (APU-CP-ABE) by combining the idea of ciphertext-policy attribute-based key encapsulation and symmetric proxy re-encryption. When an access policy update occurs, data owner is no longer required to download any data for… More >

  • Open Access

    ARTICLE

    Key-Private Identity-Based Proxy Re-Encryption

    Chunpeng Ge1, *, Jinyue Xia2, Liming Fang1

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 633-647, 2020, DOI:10.32604/cmc.2020.06217

    Abstract An identity-based proxy re-encryption scheme (IB-PRE) allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message. Due to the fact that the proxy was semi-trusted, it should place as little trust as necessary to allow it to perform the translations. In some applications such as distributed file system, it demands the adversary cannot identify the sender and recipient’s identities. However, none of the exiting IB-PRE schemes satisfy this requirement. In this work, we first define the security model of key-private IB-PRE. Finally, we propose the first key-private IB-PRE scheme. Our scheme is… More >

  • Open Access

    ARTICLE

    An Encrypted Image Retrieval Method Based on SimHash in Cloud Computing

    Jiaohua Qin1, Yusi Cao1, Xuyu Xiang1, *, Yun Tan1, Lingyun Xiang2, Jianjun Zhang3

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 389-399, 2020, DOI:10.32604/cmc.2020.07819

    Abstract With the massive growth of images data and the rise of cloud computing that can provide cheap storage space and convenient access, more and more users store data in cloud server. However, how to quickly query the expected data with privacy-preserving is still a challenging in the encryption image data retrieval. Towards this goal, this paper proposes a ciphertext image retrieval method based on SimHash in cloud computing. Firstly, we extract local feature of images, and then cluster the features by K-means. Based on it, the visual word codebook is introduced to represent feature information of images, which hashes the… More >

  • Open Access

    ARTICLE

    A Meaningful Image Encryption Algorithm Based on Prediction Error and Wavelet Transform

    Mengling Zou1, Zhengxuan Liu2, Xianyi Chen3, *

    Journal on Big Data, Vol.1, No.3, pp. 151-158, 2019, DOI:10.32604/jbd.2019.09057

    Abstract Image encryption (IE) is a very useful and popular technology to protect the privacy of users. Most algorithms usually encrypt the original image into an image similar to texture or noise, but texture and noise are an obvious visual indication that the image has been encrypted, which is more likely to cause the attacks of enemy. To overcome this shortcoming, many image encryption systems, which convert the original image into a carrier image with visual significance have been proposed. However, the generated cryptographic image still has texture features. In line with the idea of improving the visual quality of the… More >

  • Open Access

    ARTICLE

    A Privacy Preserving Deep Linear Regression Scheme Based on Homomorphic Encryption

    Danping Dong1, *, Yue Wu1, Lizhi Xiong1, Zhihua Xia1

    Journal on Big Data, Vol.1, No.3, pp. 145-150, 2019, DOI:10.32604/jbd.2019.08706

    Abstract This paper proposes a strategy for machine learning in the ciphertext domain. The data to be trained in the linear regression equation is encrypted by SHE homomorphic encryption, and then trained in the ciphertext domain. At the same time, it is guaranteed that the error of the training results between the ciphertext domain and the plaintext domain is in a controllable range. After the training, the ciphertext can be decrypted and restored to the original plaintext training data. More >

  • Open Access

    ARTICLE

    A Hybrid Encryption Algorithm for Security Enhancement of Wireless Sensor Networks: A Supervisory Approach to Pipelines

    Omid Mahdi Ebadati E.1, *, Farshad Eshghi2, Amin Zamani1

    CMES-Computer Modeling in Engineering & Sciences, Vol.122, No.1, pp. 323-349, 2020, DOI:10.32604/cmes.2020.08079

    Abstract Transmission pipelines are vulnerable to various accidents and acts of vandalism. Therefore, a reliable monitoring system is needed to secure the transmission pipelines. A wireless sensor network is a wireless network consisting of distributed devices distributed at various distances, which monitors the physical and environmental conditions using sensors. Wireless sensor networks have many uses, including the built-in sensor on the outside of the pipeline or installed to support bridge structures, robotics, healthcare, environmental monitoring, etc. Wireless Sensor networks could be used to monitor the temperature, pressure, leak detection and sabotage of transmission lines. Wireless sensor networks are vulnerable to various… More >

  • Open Access

    ARTICLE

    Pipeline Defect Detection Cloud System Using Role Encryption and Hybrid Information

    Ce Li1,2,*, Xinyu Shang2, Liguo Zhang3,4, Feng Yang1,2, Jing Zheng1,5, Xianlei Xu1

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1245-1260, 2019, DOI:10.32604/cmc.2019.06159

    Abstract Pipeline defect detection systems collect the videos from cameras of pipeline robots, however the systems always analyzed these videos by offline systems or humans to detect the defects of potential security threats. The existing systems tend to reach the limit in terms of data access anywhere, access security and video processing on cloud. There is in need of studying on a pipeline defect detection cloud system for automatic pipeline inspection. In this paper, we deploy the framework of a cloud based pipeline defect detection system, including the user management module, pipeline robot control module, system service module, and defect detection… More >

  • Open Access

    ARTICLE

    Achieving Privacy-Preserving Iris Identification Via El Gamal

    Yong Ding1, Lei Tian1, Bo Han2, Huiyong Wang2,*, Yujue Wang1, James Xi Zheng3

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 727-738, 2019, DOI:10.32604/cmc.2019.06220

    Abstract Currently, many biometric systems maintain the user’s biometrics and templates in plaintext format, which brings great privacy risk to uses’ biometric information. Biometrics are unique and almost unchangeable, which means it is a great concern for users on whether their biometric information would be leaked. To address this issue, this paper proposes a confidential comparison algorithm for iris feature vectors with masks, and develops a privacy-preserving iris verification scheme based on the El Gamal encryption scheme. In our scheme, the multiplicative homomorphism of encrypted features is used to compare of iris features and their mask information. Also, this paper improves… More >

Displaying 211-220 on page 22 of 234. Per Page