scispace - formally typeset
Z

Zehong Chen

Researcher at Shenzhen University

Publications -  6
Citations -  193

Zehong Chen is an academic researcher from Shenzhen University. The author has contributed to research in topics: Encryption & Attribute-based encryption. The author has an hindex of 4, co-authored 6 publications receiving 141 citations. Previous affiliations of Zehong Chen include Huizhou University.

Papers
More filters
Journal ArticleDOI

An efficient access control scheme with outsourcing capability and attribute update for fog computing

TL;DR: This paper proposes the first access control (CP-ABE) scheme supporting outsourcing capability and attribute update for fog computing, and the security analysis shows that the proposed scheme is secure under the decisional bilinear Diffie–Hellman assumption.
Journal ArticleDOI

Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control

TL;DR: This work proposes a verifiable keyword search scheme for big data-based MHNs with fine-grained authorization control, which is efficient with low computation load, which can be used to perform eyword searches and verify the search results quickly in a big data environment.
Proceedings ArticleDOI

Attribute-Based Encryption Scheme Supporting Decryption Outsourcing and Attribute Revocation in Cloud Storage

TL;DR: The proposed scheme outsources some decryption computational tasks to a cloud server such that the computational overhead on the user is simple and constant and an efficient attribute revocation method which concentrates on the update of the ciphertexts and users' secret keys associated with the corresponding revoked attributes is proposed.
Journal ArticleDOI

Multi-user Boolean searchable encryption supporting fast ranking in mobile clouds

TL;DR: A novel multi-user Boolean keyword search scheme (MBKSS) to achieve a rapid Boolean query outcome, while eliminating query interactions between users and the data owner, and a new homomorphic cryptosystem with partial decryption which could be used as a basis for constructing a fast ranking search protocol (FRSP).