
Abstract In the applications of Internet of Things (IoT), users usually do not believe that the cloud server is doing a good job of confidentiality, and thus the private data/documents are encrypted and maintained in the cloud storage. And then, fine-grained data sharing of these encrypted data for increased efficiency is an important requirement. Key-aggregate cryptosystem (KAC) has been proposed to address this problem, which can realize efficient delegation of decryption rights of any subset of ciphertexts. However, the end-devices of IoT may not have the special trusted hardware, and the stored keys are apt to be leaked by side-channel attacks. To solve this problem, we design two leakage-resilient KAC schemes, which can be proved secure with auxiliary input. We also implement these schemes over two platforms to test their applicability for the resource-constrained devices.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 15 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |
