We say this\(\textsf {MCFE}\)is\(\texttt {IND} \)-secure if for any adversary\(\mathcal {A}\),\(\mathsf {Adv}^{\texttt {IND}}(\mathcal {A}) = |P[\beta = 1 | b = 1] - P[\beta = 1 | b = 0]|\)is negligible. Informally, this is the usual Left-or-Right indi...
Shuangxi YANG BDAE: A Blockchain-Based and Decentralized Attribute-Based Encryption Scheme for Secure Data Sharing Wuhan University Journal of Natural Sciences , 29 , 228 -238 (2024) Ye Yuan, Jun Liu, Dou Jin, Zuogong Yue, Tao Yang, Ruijuan Chen, Maolin Wang, Lei Xu, Feng Hua, Yuqi...
Shuangxi YANG BDAE: A Blockchain-Based and Decentralized Attribute-Based Encryption Scheme for Secure Data Sharing Wuhan University Journal of Natural Sciences , 29 , 228 -238 (2024) Ye Yuan, Jun Liu, Dou Jin, Zuogong Yue, Tao Yang, Ruijuan Chen, Maolin Wang, Lei Xu, Feng Hua, Yuqi...
Adv. Sci. Technol. Eng. Syst. 2021, 6, 336–341. [Google Scholar] [CrossRef] Egevang, K.; Francis, P. The IP Network Address Translator (NAT); RFC 1631; Internet Engineering Task Force (IETF): Fremont, CA, USA, 1994. [Google Scholar] Benet, J. Ipfs-content addressed, versioned...
Another aspect of enhancing privacy is enabling data sharing between specific departments rather than placing all data on the blockchain, which is accessible to everyone. This can be achieved using the private channel features of the Quorum blockchain. Studying the feasibility and impact of this ...
Adv. Space Res. 2020, 65, 2475–2496. [Google Scholar] [CrossRef] Dalin, L.; Haijiao, W.; Zhen, Y.; Yanfeng, G.; Shi, S. An Online Distributed Satellite Cooperative Observation Scheduling Algorithm Based on Multiagent Deep Reinforcement Learning. IEEE Geosci. Remote. Sens. Lett. 2020...
Data exchange is hampered by interoperability issues across different healthcare systems. Due to a lack of consistent data management and sharing, it is hard for people to acquire the data they require. Blockchain, a distributed digital ledger, is both tamper-evident and tamper-resistant, ...
With decentralized settings, PFRB enables users to achieve fine-grained data redaction without compromising policy privacy. PFRB leverages multi-authorized attribute-based encryption and Newton’s interpolation formula-based secret sharing to construct a decentralized secret sharing for policy hiding. Then,...
Finally, auxiliary storage is introduced to enable data sharing between different organizations. The actual storage types and implementations are affected by individual application requirements. Figure 1. Consortium blockchain-based IoT service platform architecture. The following are the core components of...
The proxy re-encryption (PRE) is a suitable scheme for data sharing. PRE allows a user to grant access permission in a cryptographic method. Alice would allow Bob to visit her data under Alice’s authorization. However, the ciphertext must be transferred to the new one (Figure 1). In a...