As the use of cloud storage for various services increases,the amount of private personal information along with data stored in the cloud storage is also increasing.To remotely use the data stored on the cloud storage...
López-Alt et al.(STOC12)put forward a primitive called multi-key fully homomorphic encryption(MKFHE),in which each involved party encrypts their own data using keys that are independently and randomly chosen whereby ...
the Deanship of Scientific Research at King Saud University for funding this work through Vice Deanship of Scientific Research Chairs:Chair of Pervasive and Mobile Computing.
The rapid development of personal health records(PHR)systems enables an individual to collect,create,store and share his PHR to authorized entities.Health care systems within the smart city environment require a patie...
National Key Research and Development Program of China(Grant Nos.2017YFB0802005,2018YFB0804105);National Natural Science Foundation of China(Grant No.61602046);National Natural Science Foundation of China(Grant Nos.61872236;61572192);National Natural Science Foundation of China(Grant No.U1536205);Young Elite Scientists Sponsorship Program by CAST(Grant No.2016QNRC001);Opening Project of Guangdong Provincial Key Laboratory of Data Security and Privacy Protection(Grant No.2017B030301004);National Cryptography Development Fund(Grant No.MMJJ20170209);Anhui Initiative in Quantum Information Technologies(Grant No.AHY150100);National Key Research and Development Program of China(Grant No.2017YFB0802005);National Key Research and Development Program of China(Grant No.2017YFB0802005);National Natural Science Foundation of China(Grant No.U1536205).
Based on the identity-based encryption(IBE)from lattices by Agrawal et al.(Eurocrypt’10),Micciancio and Peikert(Eurocrypt’12)presented a CCA1-secure public-key encryption(PKE),which has the best known efficiency in ...
supported by National Natural Science Foundation of China (Grant Nos. 61202179, 61173089, 61472298, 61472310, U1405255, 61502248);National High-Tech R&D Program (863) (Grant No. 2015AA016007);SRF for ROCS, SEM and Fundamental Research Funds for the Central Universities
Attribute-Based Encryption(ABE) is a promising new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud. With the help of ABE, the majority of security issue...
the National Natural Science Foundation of China (No.60970119);the National Basic Research Program (973) of China (No.2007CB311201)
To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is proposed.Against the chos...
Project supported by the National Basic Research Program(973) of China (No. 2007CB311201);the National Natural Science Foundation of China (Nos. 60970119,60803149,60833008,and 61072067)
We propose a new biometric identity based encryption scheme (Bio-IBE), in which user biometric information is used to generate the public key with a fuzzy extractor. This is the first Bio-IBE scheme that achieves co...
This work is supported by the National Natural Science Foundation of China (No.60673070) and the Natural Science Foundation of Jiangsu Province (No.BK2006217).
Certificateless public key cryptography was introduced to solve the key escrow problem in identity based cryptography while enjoying the most attractive certificateless property. In this paper, we present a secure Cer...
the National High Technology Research and Development Program (863) of China(No. 2006AA12A106)
Two new constructions of chosen-ciphertext secure fuzzy identity-based encryption (fuzzy-IBE) schemes without random oracle are proposed. The first scheme combines the modification of chosen-plaintext secure Sahai a...