Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (295)
  • Open Access

    ARTICLE

    Several Attacks on Attribute-Based Encryption Schemes

    Phi Thuong Le1, Huy Quoc Le2, Viet Cuong Trinh1,*

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4741-4756, 2025, DOI:10.32604/cmc.2025.064486 - 19 May 2025

    Abstract Attribute-based encryption () is a cryptographic framework that provides flexible access control by allowing encryption based on user attributes. is widely applied in cloud storage, file sharing, e-Health, and digital rights management. schemes rely on hard cryptographic assumptions such as pairings and others (pairing-free) to ensure their security against external and internal attacks. Internal attacks are carried out by authorized users who misuse their access to compromise security with potentially malicious intent. One common internal attack is the attribute collusion attack, in which users with different attribute keys collaborate to decrypt data they could not… More >

  • Open Access

    ARTICLE

    Efficient Searchable Encryption Scheme Supporting Fuzzy Multi-Keyword Ranking Search on Blockchain

    Hongliang Tian, Zhong Fan*, Zhiyang Ruan, Aomen Zhao

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5199-5217, 2025, DOI:10.32604/cmc.2025.063274 - 19 May 2025

    Abstract With the continuous growth of exponential data in IoT, it is usually chosen to outsource data to the cloud server. However, cloud servers are usually provided by third parties, and there is a risk of privacy leakage. Encrypting data can ensure its security, but at the same time, it loses the retrieval function of IoT data. Searchable Encryption (SE) can achieve direct retrieval based on ciphertext data. The traditional searchable encryption scheme has the problems of imperfect function, low retrieval efficiency, inaccurate retrieval results, and centralized cloud servers being vulnerable and untrustworthy. This paper proposes… More >

  • Open Access

    ARTICLE

    A Lightweight IoT Data Security Sharing Scheme Based on Attribute-Based Encryption and Blockchain

    Hongliang Tian, Meiruo Li*

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5539-5559, 2025, DOI:10.32604/cmc.2025.060297 - 19 May 2025

    Abstract The accelerated advancement of the Internet of Things (IoT) has generated substantial data, including sensitive and private information. Consequently, it is imperative to guarantee the security of data sharing. While facilitating fine-grained access control, Ciphertext Policy Attribute-Based Encryption (CP-ABE) can effectively ensure the confidentiality of shared data. Nevertheless, the conventional centralized CP-ABE scheme is plagued by the issues of key misuse, key escrow, and large computation, which will result in security risks. This paper suggests a lightweight IoT data security sharing scheme that integrates blockchain technology and CP-ABE to address the abovementioned issues. The integrity… More >

  • Open Access

    ARTICLE

    Single Qubit Quantum Logistic-Sine XYZ-Rotation Maps: An Ultra-Wide Range Dynamics for Image Encryption

    De Rosal Ignatius Moses Setiadi1,*, T. Sutojo1, Supriadi Rustad1, Muhamad Akrom1, Sudipta Kr Ghosal2, Minh T. Nguyen3, Arnold Adimabua Ojugo4

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2161-2188, 2025, DOI:10.32604/cmc.2025.063729 - 16 April 2025

    Abstract Data security has become a growing priority due to the increasing frequency of cyber-attacks, necessitating the development of more advanced encryption algorithms. This paper introduces Single Qubit Quantum Logistic-Sine XYZ-Rotation Maps (SQQLSR), a quantum-based chaos map designed to generate one-dimensional chaotic sequences with an ultra-wide parameter range. The proposed model leverages quantum superposition using Hadamard gates and quantum rotations along the X, Y, and Z axes to enhance randomness. Extensive numerical experiments validate the effectiveness of SQQLSR. The proposed method achieves a maximum Lyapunov exponent (LE) of ≈55.265, surpassing traditional chaotic maps in unpredictability. The bifurcation analysis… More >

  • Open Access

    ARTICLE

    Blockchain-Based Framework for Secure Sharing of Cross-Border Trade Data

    Shenjian Xiao1, Xiaoli Qin1, Yanzhao Tian1,*, Zhongkai Dang2

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2351-2373, 2025, DOI:10.32604/cmc.2025.062324 - 16 April 2025

    Abstract The advent of the digital age has consistently provided impetus for facilitating global trade, as evidenced by the numerous customs clearance documents and participants involved in the international trade process, including enterprises, agents, and government departments. However, the urgent issue that requires immediate attention is how to achieve secure and efficient cross-border data sharing among these government departments and enterprises in complex trade processes. In addressing this need, this paper proposes a data exchange architecture employing Multi-Authority Attribute-Based Encryption (MA-ABE) in combination with blockchain technology. This scheme supports proxy decryption, attribute revocation, and policy update,… More >

  • Open Access

    ARTICLE

    Joint Watermarking and Encryption for Social Image Sharing

    Conghuan Ye1,*, Shenglong Tan1, Shi Li1, Jun Wang1, Qiankun Zuo1, Bing Xiong2

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2927-2946, 2025, DOI:10.32604/cmc.2025.062051 - 16 April 2025

    Abstract With the fast development of multimedia social platforms, content dissemination on social media platforms is becoming more popular. Social image sharing can also raise privacy concerns. Image encryption can protect social images. However, most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial domain. In this work, the authors propose a secure social image-sharing method with watermarking/fingerprinting and encryption. First, the fingerprint code with a hierarchical community structure is designed based on social network analysis. Then, discrete wavelet transform (DWT) from block discrete cosine transform (DCT) directly… More >

  • Open Access

    ARTICLE

    Chaos-Based Novel Watermarked Satellite Image Encryption Scheme

    Mohamed Medani1, Yahia Said2, Nashwan Adnan Othman3,4, Farrukh Yuldashev5, Mohamed Kchaou6, Faisal Khaled Aldawood6, Bacha Rehman7,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 1049-1070, 2025, DOI:10.32604/cmes.2025.063405 - 11 April 2025

    Abstract Satellite images are widely used for remote sensing and defence applications, however, they are subject to a variety of threats. To ensure the security and privacy of these images, they must be watermarked and encrypted before communication. Therefore, this paper proposes a novel watermarked satellite image encryption scheme based on chaos, Deoxyribonucleic Acid (DNA) sequence, and hash algorithm. The watermark image, DNA sequence, and plaintext image are passed through the Secure Hash Algorithm (SHA-512) to compute the initial condition (keys) for the Tangent-Delay Ellipse Reflecting Cavity Map (TD-ERCS), Henon, and Duffing chaotic maps, respectively. Through More >

  • Open Access

    ARTICLE

    IDCE: Integrated Data Compression and Encryption for Enhanced Security and Efficiency

    Muhammad Usama1, Arshad Aziz2, Suliman A. Alsuhibany3,*, Imtiaz Hassan2, Farrukh Yuldashev4

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 1029-1048, 2025, DOI:10.32604/cmes.2025.061787 - 11 April 2025

    Abstract Data compression plays a vital role in data management and information theory by reducing redundancy. However, it lacks built-in security features such as secret keys or password-based access control, leaving sensitive data vulnerable to unauthorized access and misuse. With the exponential growth of digital data, robust security measures are essential. Data encryption, a widely used approach, ensures data confidentiality by making it unreadable and unalterable through secret key control. Despite their individual benefits, both require significant computational resources. Additionally, performing them separately for the same data increases complexity and processing time. Recognizing the need for More >

  • Open Access

    ARTICLE

    Enhanced Triple Layered Approach for Mitigating Security Risks in Cloud

    Tajinder Kumar1, Purushottam Sharma2,*, Xiaochun Cheng3,*, Sachin Lalar4, Shubham Kumar5, Sandhya Bansal6

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 719-738, 2025, DOI:10.32604/cmc.2025.060836 - 26 March 2025

    Abstract With cloud computing, large chunks of data can be handled at a small cost. However, there are some reservations regarding the security and privacy of cloud data stored. For solving these issues and enhancing cloud computing security, this research provides a Three-Layered Security Access model (TLSA) aligned to an intrusion detection mechanism, access control mechanism, and data encryption system. The TLSA underlines the need for the protection of sensitive data. This proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard (AES). For data transfer and storage, this encryption guarantees the data’s… More >

  • Open Access

    ARTICLE

    Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud

    Xixi Yan1, Jing Zhang2,*, Pengyu Cheng2

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 1399-1414, 2025, DOI:10.32604/cmc.2025.059969 - 26 March 2025

    Abstract Conditional proxy re-encryption (CPRE) is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular, but most of the attribute-based conditional proxy re-encryption (AB-CPRE) schemes proposed so far do not take into account the importance of user attributes. A weighted attribute-based conditional proxy re-encryption (WAB-CPRE) scheme is thus designed to provide more precise decryption rights delegation. By introducing the concept of weight attributes, the quantity of system attributes managed by the server is reduced greatly. At the same time, a weighted tree structure is constructed… More >

Displaying 31-40 on page 4 of 295. Per Page