JN

Jianting Ning

Authored

19 records found

VAL

Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents

Searchable Encryption schemes provide secure search over encrypted databases while allowing admitted information leakages. Generally, the leakages can be categorized into access and volume pattern. In most existing SE schemes, these leakages are caused by practical designs but ar ...

CryptCloud+

Secure and Expressive Data Access Control for Cloud Storage

Secure cloud storage, an emerging cloud service, guarantees the confidentiality of outsourced data while providing flexible data access control for cloud users whose data are out of their physical control. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is one of the promis ...

CryptCloud+

Secure and Expressive Data Access Control for Cloud Storage

Secure cloud storage, an emerging cloud service, guarantees the confidentiality of outsourced data while providing flexible data access control for cloud users whose data are out of their physical control. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is one of the promis ...

CryptCloud+

Secure and Expressive Data Access Control for Cloud Storage

Secure cloud storage, an emerging cloud service, guarantees the confidentiality of outsourced data while providing flexible data access control for cloud users whose data are out of their physical control. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is one of the promis ...

Encryption Switching Service

Securely Switch Your Encrypted Data to Another Format

Big data analytics has been regarded as a promising technology to yield better insights into future development by government and industry. Data collection and aggregation are necessary steps to enable data analysis. However, data may be dispersed across multiple places and in di ...

Encryption Switching Service

Securely Switch Your Encrypted Data to Another Format

Big data analytics has been regarded as a promising technology to yield better insights into future development by government and industry. Data collection and aggregation are necessary steps to enable data analysis. However, data may be dispersed across multiple places and in di ...

Encryption Switching Service

Securely Switch Your Encrypted Data to Another Format

Big data analytics has been regarded as a promising technology to yield better insights into future development by government and industry. Data collection and aggregation are necessary steps to enable data analysis. However, data may be dispersed across multiple places and in di ...
Cloud-based data storage service has drawn increasing interests from both academic and industry in the recent years due to its efficient and low cost management. Since it provides services in an open network, it is urgent for service providers to make use of secure data storage a ...
Outsourcing encrypted data to cloud servers that has become a prevalent trend among Internet users to date. There is a long list of advantages on data outsourcing, such as the reduction cost of local data management. How to securely operate encrypted data (remotely), however, is ...
Homomorphic encryption is a very useful gradient protection technique used in privacy preserving federated learning. However, existing encrypted federated learning systems need a trusted third party to generate and distribute key pairs to connected participants, making them unsui ...
Searchable functionality is provided in many online services such as mail services or outsourced data storage. To protect users privacy, data in these services is usually stored after being encrypted using searchable encryption. This enables the data user to securely search encry ...