Now showing items 1-7 of 7

  • A privacy-preserving fuzzy interest matching protocol for friends finding in social networks 

    Wang, Xu An; Xhafa Xhafa, Fatos; Luo, Xiaoshuang; Zhang, Shuaiwei; Ding, Yong (Springer, 2017-02-07)
    Article
    Open Access
    Nowadays, it is very popular to make friends, share photographs, and exchange news throughout social networks. Social networks widely expand the area of people’s social connections and make communication much smoother than ...
  • Cost-effective secure e-health cloud system using identity based cryptographic techniques 

    Wang, Xu An; Ma, Jianfeng; Xhafa Xhafa, Fatos; Zhang, Mingwu; Luo, Xiaoshuang (Elsevier, 2016-08-31)
    Article
    Open Access
    Nowadays E-health cloud systems are more and more widely employed. However the security of these systems needs more consideration for the sensitive health information of patients. Some protocols on how to secure the e-health ...
  • Efficient privacy preserving predicate encryption with fine-grained searchable capability for cloud storage 

    Wang, Xu An; Xhafa Xhafa, Fatos; Cai, Weiyi; Ma, Jianfeng; Wei, Fushan (2016-06-01)
    Article
    Open Access
    With the fast development in Cloud storage technologies and ever increasing use of Cloud data centres, data privacy and confidentiality has become a must. Indeed, Cloud data centres store each time more sensitive data such ...
  • Identity based proxy re-encryption scheme (IBPRE+) for secure cloud data sharing 

    Wang, Xu An; Xhafa Xhafa, Fatos; Zheng, Zhiheng; Nie, Jinting (Institute of Electrical and Electronics Engineers (IEEE), 2016)
    Conference report
    Open Access
    In proxy re-encryption (PRE), a proxy with re-encryption keys can transfer aciphertext computed under Alice's public key into a new one, which can be decrypted by Bob only with his secret key. Recently, Wang et al. introduced ...
  • Non-transferable unidirectional proxy re-encryption scheme for secure social cloud storage sharing 

    Wang, Xu An; Xhafa Xhafa, Fatos; Hao, Wei; He, Wei (Institute of Electrical and Electronics Engineers (IEEE), 2016)
    Conference report
    Open Access
    Proxy re-encryption (PRE), introduced by Blaze et al. in 1998, allows a semi-trusted proxy with the re-encryption key to translatea ciphertext under the delegator into another ciphertext, which can be decrypted by the ...
  • PRE+: dual of proxy re-encryption for secure cloud data sharing service 

    Wang, Xu An; Xhafa Xhafa, Fatos; Ma, Jianfeng; Ge, Yunlong (2018-01)
    Article
    Open Access
    With the rapid development of very large, diverse, complex, and distributed datasets generated from internet transactions, emails, videos, business information systems, manufacturing industry, sensors and internet of things ...
  • Reusable garbled gates for new fully homomorphic encryption service 

    Wang, Xu An; Xhafa Xhafa, Fatos; Ma, Jianfeng; Cao, Yunfei; Tang, Dianhua (2017-02-06)
    Article
    Open Access
    In this paper, we propose a novel way to provide a fully homomorphic encryption service, namely by using garbled circuits. From a high level perspective, garbled circuits and fully homomorphic encryption, both aim at ...