Results 41 to 50 of about 696,470 (284)

Attribute-based proxy re-encryption with keyword search. [PDF]

open access: yesPLoS ONE, 2014
Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy.
Yanfeng Shi   +5 more
doaj   +1 more source

A Blockchain Data Sharing Scheme Based on LWE-CPABE [PDF]

open access: yesJisuanji gongcheng, 2022
To solve the threat that quantum computing poses to the privacy protection technology using number theory applied to blockchains, a post-quantum Ciphertext-Policy Attribute-Based Encryption(CPABE) blockchain data sharing scheme based on lattice theory is
ZHANG Xiaodong, CHEN Taowei, YU Yimin
doaj   +1 more source

Revocable-Attribute-Based Encryption with En-DKER from Lattices

open access: yesMathematics, 2023
Cloud computing offers abundant computing resources and scalable storage, but data leakage in the cloud storage environment is a common and critical concern due to inadequate protection measures.
Qi Wang   +3 more
doaj   +1 more source

Anonymous Attribute-based Credentials in Collaborative Indoor Positioning Systems

open access: yesInternational Conference on Security and Cryptography, 2021
Collaborative Indoor Positioning Systems (CIPSs) have recently received considerable attention, mainly because they address some existing limitations of traditional Indoor Positioning Systems (IPSs).
Raúl Casanova Marqués   +3 more
semanticscholar   +1 more source

Fast Large Integer Modular Addition in GF(p) Using Novel Attribute-Based Representation

open access: yesIEEE Access, 2019
Addition is an essential operation in all cryptographic algorithms. Higher levels of security require larger key sizes and this becomes a limiting factor in GF(p) using large integers because of the carry propagation problem.
Bader Alhazmi, Fayez Gebali
doaj   +1 more source

A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing [PDF]

open access: yes, 2016
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over ...
Kiraz, Mehmet Sabir
core   +1 more source

I2PA, U-prove, and Idemix: An Evaluation of Memory Usage and Computing Time Efficiency in an IoT Context

open access: yes, 2020
The Internet of Things (IoT), in spite of its innumerable advantages, brings many challenges namely issues about users' privacy preservation and constraints about lightweight cryptography.
AA Ciss   +10 more
core   +1 more source

Sustainable Network by Enhancing Attribute-Based Selection Mechanism Using Lagrange Interpolation

open access: yesSustainability, 2022
The security framework in Ad-hoc Networks (ANET) continues to attract the attention of researchers, although significant work has been accomplished already.
Chetna Monga   +5 more
semanticscholar   +1 more source

Biometric based Multi-Authority Inner Product Encryption for Electronic Health Record [PDF]

open access: yesEAI Endorsed Transactions on Pervasive Health and Technology, 2020
INTRODUCTION: Attribute-based encryption enhances the security of electronic health records outsourced to the cloud. At thesame time, single authority attribute based encryption leads to user privacy breech and attribute management complexity.Multi ...
C. Exceline, Jasmine Norman
doaj   +1 more source

Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials

open access: yes, 2022
In this thesis we analyze two privacy-preserving attribute-based cryptographic primitives: attribute-based signatures (ABS) and updatable anonymous credentials (UAC). ABS schemes allow users to authenticate messages in a privacy-preserving manner while proving that their information encoded as attributes in their secret keys satisfy a policy.
openaire   +1 more source

Home - About - Disclaimer - Privacy