2017
DOI: 10.1007/s11036-017-0975-x
|View full text |Cite
|
Sign up to set email alerts
|

RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 34 publications
(19 citation statements)
references
References 36 publications
0
19
0
Order By: Relevance
“…We assume that the Hash function is cryptologically secure. More specifically, it is assumed that the Hash functions used in our schemes are resistant against the weak collision attacks and the strong collision attacks [29]. Moreover, we assume that the mediator is a semitrusted data aggregator.…”
Section: Adversary Modelmentioning
confidence: 99%
“…We assume that the Hash function is cryptologically secure. More specifically, it is assumed that the Hash functions used in our schemes are resistant against the weak collision attacks and the strong collision attacks [29]. Moreover, we assume that the mediator is a semitrusted data aggregator.…”
Section: Adversary Modelmentioning
confidence: 99%
“…The algorithm sets ℎ to be ℎ + 1, concatenates ( , V, ) to currentPath, sets V to be currentNode, and saves the current node to nodeHistory. Then, the function ADFS() is called recursively from node V. If a matching path is found, the algorithm will return T from (1) if ℎ + 1 > hopcount then (2) return F (3) else (4) for all (V, ) where ( , V, ) in do (5) if 1 (V ∈ currentPath) (6) break (7) if 2 ((V ∉ currentPath) && (V = end)) (8) if (path reg exp[ℎ] != ) then (9) break (10) if (! match (path.attre spec [ℎ].pro attr group, v.pro atr group)) then (11) break (12) ℎ…”
Section: Policy Languagementioning
confidence: 99%
“…Users can conveniently share personal information with friends via OSNs. More than 300 hours of videos are uploaded to YouTube and nearly 25 million photos are posted to Instagram every minute [1]. Considering the fact that sensitive information may be leaked, the protection of users' privacy becomes a challenging task.…”
Section: Introductionmentioning
confidence: 99%
“…So more and more anonymous applications have appeared, such as electronic auctions, electronic voting, etc. Schemes [15] and [16] can be used as possible solutions to achieve privacy protection. Wang et al proposed anonymous two-factor authentication in distributed systems [17] and in wireless sensor networks [18].…”
Section: Introductionmentioning
confidence: 99%