Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts

    Attribute-based encryption (ABE) allows user to encrypt and decrypt data based on user attributes, and can be applied in some promising area such as mobile cloud storage. Since these are massive users in these...

    Yuejian Fang, Zilong Wen, Qingni Shen in Security and Privacy in Communication Netw… (2015)

  2. No Access

    Chapter and Conference Paper

    SEDOSN: A Secure Decentralized Online Social Networking Framework

    Today’s online social networking services (OSN) such as Facebook, Twitter are centralized. Users’ information may be leaked by these service providers, which results in potential privacy problems. Decentralize...

    Yuejian Fang, Zilong Wen, Qingni Shen, Yahui Yang in Embedded System Technology (2015)

  3. No Access

    Chapter and Conference Paper

    Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability

    To ensure the security of sensitive data, people need to encrypt them before uploading them to the public storage. Attribute-based encryption (ABE) is a promising cryptographic primitive for fine-grained shari...

    **ng Zhang, Cancan **, Cong Li, Zilong Wen in Security and Privacy in Communication Netw… (2015)

  4. No Access

    Chapter and Conference Paper

    Attribute-Based Encryption Without Key Escrow

    Attribute-Based Encryption (ABE) is a promising cryptographic primitive for fine-grained sharing of encrypted data. However, ABE has a major shortcoming which is called the key escrow problem. Key generation c...

    **ng Zhang, Cancan **, Zilong Wen, Qingni Shen in Cloud Computing and Security (2015)