Guangzhou University

Displaying 1-7 of 7 results

  • White Papers // May 2014

    Convergent Dispersal: Toward Storage-Efficient Security in a Cloud-of-Clouds

    Cloud-of-clouds storage exploits diversity of cloud storage vendors to provide fault tolerance and avoid vendor lock-ins. Its inherent diversity property also enables the authors to offer keyless data security via dispersal algorithms. However, the keyless security of existing dispersal algorithms relies on the embedded random information, which breaks data deduplication...

    Provided By Guangzhou University

  • White Papers // Nov 2013

    Construction of Multiplicative Monotone Span Program

    Multiplicative monotone span program is one of the important tools to realize secure multiparty computation. It is essential to construct multiplicative monotone span programs for secure multiparty computations. For any access structure, the researcher gave a method to construct multiplicative monotone span programs, but its row size became double, and...

    Provided By Guangzhou University

  • White Papers // Jul 2013

    Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption

    As cloud computing becomes prevalent, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for outsourced data security and privacy. Attribute-Based Encryption (ABE) is a promising cryptographic primitive, which has been widely applied to design fine-grained access control system recently. However,...

    Provided By Guangzhou University

  • White Papers // May 2013

    A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release

    To allow a delegator not only to delegate the keyword-controlled decryption rights of a broadcast encryption to a set of specified recipients, but also to control when the decryption rights will be delegated, in this paper, for the first time, the authors introduce a new notion called Timed-Release Conditional Proxy...

    Provided By Guangzhou University

  • White Papers // Nov 2012

    Secure Outsourced Attribute-Based Encryption

    Attribute-Based Encryption (ABE) is a promising cryptographic primitive which significantly enhances the versatility of access control mechanisms. Due to the high expressiveness of ABE policies, the computational complexities of ABE key-issuing (by Attribute Authorities (AAs)) and decryption (by eligible users) are getting prohibitively high. Despite that the existing Outsourced ABE...

    Provided By Guangzhou University

  • White Papers // Oct 2012

    Secure Outsourced Attribute-Based Signatures

    Attribute-Based Signature (ABS) is a useful variant of digital signature, which enables users to sign messages over attributes without revealing any information other than the fact that they have attested to the messages. However, heavy computational cost is required during signing in existing work of ABS, which grows linearly with...

    Provided By Guangzhou University

  • White Papers // Jan 2011

    The Optimal Linear Secret Sharing Scheme for Any Given Access Structure

    Any linear code can be used to construct a linear secret sharing scheme. In this paper, it is shown how to decide optimal linear codes (i.e., with the biggest information rate) realizing a given access structure over finite fields. It amounts to solving a system of quadratic equations constructed from...

    Provided By Guangzhou University

  • White Papers // Nov 2012

    Secure Outsourced Attribute-Based Encryption

    Attribute-Based Encryption (ABE) is a promising cryptographic primitive which significantly enhances the versatility of access control mechanisms. Due to the high expressiveness of ABE policies, the computational complexities of ABE key-issuing (by Attribute Authorities (AAs)) and decryption (by eligible users) are getting prohibitively high. Despite that the existing Outsourced ABE...

    Provided By Guangzhou University

  • White Papers // Oct 2012

    Secure Outsourced Attribute-Based Signatures

    Attribute-Based Signature (ABS) is a useful variant of digital signature, which enables users to sign messages over attributes without revealing any information other than the fact that they have attested to the messages. However, heavy computational cost is required during signing in existing work of ABS, which grows linearly with...

    Provided By Guangzhou University

  • White Papers // Jan 2011

    The Optimal Linear Secret Sharing Scheme for Any Given Access Structure

    Any linear code can be used to construct a linear secret sharing scheme. In this paper, it is shown how to decide optimal linear codes (i.e., with the biggest information rate) realizing a given access structure over finite fields. It amounts to solving a system of quadratic equations constructed from...

    Provided By Guangzhou University

  • White Papers // May 2013

    A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release

    To allow a delegator not only to delegate the keyword-controlled decryption rights of a broadcast encryption to a set of specified recipients, but also to control when the decryption rights will be delegated, in this paper, for the first time, the authors introduce a new notion called Timed-Release Conditional Proxy...

    Provided By Guangzhou University

  • White Papers // May 2014

    Convergent Dispersal: Toward Storage-Efficient Security in a Cloud-of-Clouds

    Cloud-of-clouds storage exploits diversity of cloud storage vendors to provide fault tolerance and avoid vendor lock-ins. Its inherent diversity property also enables the authors to offer keyless data security via dispersal algorithms. However, the keyless security of existing dispersal algorithms relies on the embedded random information, which breaks data deduplication...

    Provided By Guangzhou University

  • White Papers // Nov 2013

    Construction of Multiplicative Monotone Span Program

    Multiplicative monotone span program is one of the important tools to realize secure multiparty computation. It is essential to construct multiplicative monotone span programs for secure multiparty computations. For any access structure, the researcher gave a method to construct multiplicative monotone span programs, but its row size became double, and...

    Provided By Guangzhou University

  • White Papers // Jul 2013

    Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption

    As cloud computing becomes prevalent, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for outsourced data security and privacy. Attribute-Based Encryption (ABE) is a promising cryptographic primitive, which has been widely applied to design fine-grained access control system recently. However,...

    Provided By Guangzhou University