Searched for: +
(1 - 2 of 2)
document
Wang, Wei (author), Liu, Dongli (author), Xu, Peng (author), Yang, Laurence Tianruo (author), Liang, K. (author)
It has become a trend for clients to outsource their encrypted databases to remote servers and then leverage the Searchable Encryption technique to perform secure data retrieval. However, the method has yet to be considered a crucial need for replication on searchable encrypted data. It calls for challenging works on Dynamic Searchable...
journal article 2023
document
Wang, Lili (author), Lin, Ye (author), Yao, Ting (author), Xiong, Hu (author), Liang, K. (author)
Existing proxy re-encryption (PRE) schemes to secure cloud data sharing raise challenges such as supporting the heterogeneous system efficiently and achieving the unbounded feature. To address this problem, we proposed a fast and secure unbounded cross-domain proxy re-encryption scheme, named FABRIC, which enables the delegator to authorize...
journal article 2023