Caixia Ma's research while affiliated with Hebei University and other places

What is this page?


This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

Publications (4)


Multi-Client Searchable Symmetric Encryption in Redactable Blockchain for Conjunctive Queries
  • Conference Paper

July 2023

·

5 Reads

Ruizhong Du

·

Na Liu

·

Mingyue Li

·

Caixia Ma
Share


Privacy-Preserving Searchable Encryption Scheme Based on Public and Private Blockchains

February 2023

·

41 Reads

·

11 Citations

Tsinghua Science & Technology

While users enjoy the convenience of data outsourcing in the cloud, they also face the risks of data modification and private information leakage. Searchable encryption technology can perform keyword searches over encrypted data while protecting their privacy and guaranteeing the integrity of the data by verifying the search results. However, some associated problems are still encountered, such as the low efficiency of verification and uncontrollable query results. Accordingly, this paper proposes a Privacy-Preserving Searchable Encryption (PPSE) scheme based on public and private blockchains. First, we store an encrypted index in a private blockchain while outsourcing corresponding encrypted documents to a public blockchain. The encrypted documents are located through the encrypted index. This method can reduce the storage overhead on the blockchains, and improve the efficiency of transaction execution and the security of stored data. Moreover, we adopt a smart contract to introduce a secondary verification access control mechanism and restrict data users' access to the private blockchain through authorization for the purpose of guaranteeing data privacy and the correctness of access control verification. Finally, the security analysis and experimental results indicate that compared with existing schemes, the proposed scheme can not only improve the security of encrypted data but also guarantee the efficiency of the query.


Citations (3)


... In the world of interconnected systems, privacy is crucial, especially when it comes to sensitive healthcare data protected by HIPAA regulations (Yuan,et al,2019). This section delves into the key architectural principles behind building and deploying secure systems that prioritize privacy (Ruizhong et al. 2023). ...

Reference:

Distributed Solutions for Secure Healthcare Data Exchange: A Critical Review of Privacy and Regulations
Pattern-protecting Dynamic Searchable Symmetric Encryption Based on Differential privacy
  • Citing Conference Paper
  • July 2023

... Security solutions based on symmetric key cryptography have been the major focus due to the very constrained resources such as processing and battery power as well as memory. A lot of work has been done to solve the key distribution and authentication problems (Camtepe and Yener, 2004;Chan et al, 2003;Du et al, 2003;Eschenauer and Gligor, 2002;Liu and Ning, 2003;Zhu et al, 2003;Perrig et al, 2001). During the last two years PKC has attracted some attention, due to its capability to simplify tasks such as key distribution and ensuring data integrity. ...

Three-dimensional Key Distribution Scheme in Wireless Sensor Networks
  • Citing Conference Paper
  • December 2022

... Our approach differs from other blockchain implementations as we suggest using private blockchain to create a more exclusive and low-cost platform. Private blockchains provide a trusted and private data structure with low transaction costs without the Proof-of-Work (PoW) and fewer participating nodes due to its exclusivity [13]. Also, most frameworks collaborate with existing IM platforms and designs to create a working system. ...

Privacy-Preserving Searchable Encryption Scheme Based on Public and Private Blockchains
  • Citing Article
  • February 2023

Tsinghua Science & Technology