2016
DOI: 10.1016/j.future.2015.11.006
|View full text |Cite
|
Sign up to set email alerts
|

Two Schemes of Privacy-Preserving Trust Evaluation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 57 publications
(43 citation statements)
references
References 25 publications
0
43
0
Order By: Relevance
“…When a user requests the pre-evaluation result from EP, the EP first checks the user's access eligibility with AP. If the check is positive, the AP re-encrypts the pre evaluation result that can be decrypted by the requester (Scheme 1) or there is an additional step involving the EP that prevents the AP from obtaining the plain pre-evaluation result while still allowing decryption of the pre-evaluation result by the requester (Scheme 2) [53].…”
Section: Privacy-preserving Big Data Publishingmentioning
confidence: 99%
“…When a user requests the pre-evaluation result from EP, the EP first checks the user's access eligibility with AP. If the check is positive, the AP re-encrypts the pre evaluation result that can be decrypted by the requester (Scheme 1) or there is an additional step involving the EP that prevents the AP from obtaining the plain pre-evaluation result while still allowing decryption of the pre-evaluation result by the requester (Scheme 2) [53].…”
Section: Privacy-preserving Big Data Publishingmentioning
confidence: 99%
“…To ensure maximum scalability, they implemented a hybrid of the OpenMP-MPL programming paradigm, by means of which they enabled each processing core to be assigned a number of files and then for each core to subdivide these files, depending on the number of threads being used [33]. Yan et al (2016) propose two security schemes in which the aim is to protect the confidential information of trusted suppliers. The first scheme focuses on computational efficiency while the second provides better protection at the expense of computational cost.…”
Section: Security Mechanisms Based Literature Reviewmentioning
confidence: 99%
“…The first scheme focuses on computational efficiency while the second provides better protection at the expense of computational cost. They use proxy-based additive homomorphism with reencryption to design these two schemes for Privacy-Preserving Trust Evaluation (PPTE) [34]. Zhou et al (2015) propose an encryption algorithm that focuses on image security.…”
Section: Security Mechanisms Based Literature Reviewmentioning
confidence: 99%
“…Wei et al [6] proposed a secure computation auditing protocol which bridges secure storage and computation within a cloud and achieves privacy using verifier signature, batch verification, and probabilistic sampling techniques. Yan et al [7] proposed two privacy preserving techniques for trust evaluation based on additive homomorphic encryption. It is applicative approach and supports big data process.…”
Section: Related Workmentioning
confidence: 99%