scispace - formally typeset
J

Jinyue Xia

Researcher at IBM

Publications -  41
Citations -  683

Jinyue Xia is an academic researcher from IBM. The author has contributed to research in topics: Encryption & Cloud computing. The author has an hindex of 8, co-authored 33 publications receiving 331 citations. Previous affiliations of Jinyue Xia include University of North Carolina at Charlotte & Research Triangle Park.

Papers
More filters
Journal ArticleDOI

Secure Key Distribution for the Smart Grid

TL;DR: This paper overviews the key management scheme recently proposed by Wu-Zhou and shows it is vulnerable to the man-in-the-middle attack, and proposes a new key distribution protocol which is secure and efficient for smart grid network.
Journal ArticleDOI

Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds

TL;DR: A novel security notion named revocable identity-based broadcast proxy re-encryption (RIB-BPRE) is presented to address the issue of key revocation and the performance evaluation reveals that the proposed scheme is efficient and practical.
Journal ArticleDOI

Secure Keyword Search and Data Sharing Mechanism for Cloud Computing

TL;DR: This article proposes a ciphertext-policy attribute-based mechanism with keyword search and data sharing (CPAB-KSDS) for encrypted cloud data and proves that it is against chosen ciphertext attack and chosen keyword attack secure in the random oracle model.
Journal ArticleDOI

Revocable Attribute-Based Encryption with Data Integrity in Clouds

TL;DR: Li et al. as mentioned in this paper proposed a revocable attribute-based encryption with data integrity protection (RABE-DI) scheme, which can achieve one-to-many encrypted data sharing.
Journal ArticleDOI

A Verifiable and Fair Attribute-based Proxy Re-encryption Scheme for Data Sharing in Clouds

TL;DR: A novel verifiable and fair attribute-based proxy re-encryption (VF-ABPRE) scheme is introduced to support verifiability and fairness and ensures a cloud server escape from malicious accusation if it has indeed conducted the re-Encryption operation honestly.