The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Authenticated key exchange (AKE) protocol allows a user and a server to authenticate each other and generate a session key for the subsequent communications. With the rapid development of low-power and highly-efficient networks, such as pervasive and mobile computing network in recent years, many efficient AKE protocols have been proposed to achieve user privacy and authentication in the communications...
Cloud storage is now an important development trend in information technology. To ensure the integrity of data storage in cloud storing, researchers have present some provable data possession (PDP) schemes. In some cases, the rank of trust for data owner is low. Verifiers are not willing to check data of the owners. Hence, in this paper, we propose the first double delegable PDP scheme, in which both...
Cloud storage is now an important development trend in information technology. To ensure the integrity of data storage in cloud storing, researchers have present some provable data possession (PDP) schemes. In some cases, the ability to check data possession is delegated by data owners. Hence, the delegable provable data possession and proxy provable data possession are proposed. However the PDP schemes...
Cloud storage is now an important developmenttrend in information technology. However, informationsecurity has become an important problem to impede it forcommercial application, such as data confidentiality, integrity,and availability. In this paper, we revisit the two private PDPschemes. We show that the property of correctness cannot beachieved when active adversaries are involved in these auditingsystems...
We present the first and efficient multi-authority fuzzy identity-based key encapsulation mechanism (fuzzy-IB-KEM) scheme which is chosen ciphertext secure (CCA) without random oracle in the selective-ID model. Our main idea is to enhance Chase's "large universe" construction, chosen-plaintext secure (CPA) fuzzy-IBE, by adding some redundant information to the ciphertext to make it CCA-secure.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.