Results 41 to 50 of about 696,470 (284)
Attribute-based proxy re-encryption with keyword search. [PDF]
Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy.
Yanfeng Shi +5 more
doaj +1 more source
A Blockchain Data Sharing Scheme Based on LWE-CPABE [PDF]
To solve the threat that quantum computing poses to the privacy protection technology using number theory applied to blockchains, a post-quantum Ciphertext-Policy Attribute-Based Encryption(CPABE) blockchain data sharing scheme based on lattice theory is
ZHANG Xiaodong, CHEN Taowei, YU Yimin
doaj +1 more source
Revocable-Attribute-Based Encryption with En-DKER from Lattices
Cloud computing offers abundant computing resources and scalable storage, but data leakage in the cloud storage environment is a common and critical concern due to inadequate protection measures.
Qi Wang +3 more
doaj +1 more source
Anonymous Attribute-based Credentials in Collaborative Indoor Positioning Systems
Collaborative Indoor Positioning Systems (CIPSs) have recently received considerable attention, mainly because they address some existing limitations of traditional Indoor Positioning Systems (IPSs).
Raúl Casanova Marqués +3 more
semanticscholar +1 more source
Fast Large Integer Modular Addition in GF(p) Using Novel Attribute-Based Representation
Addition is an essential operation in all cryptographic algorithms. Higher levels of security require larger key sizes and this becomes a limiting factor in GF(p) using large integers because of the carry propagation problem.
Bader Alhazmi, Fayez Gebali
doaj +1 more source
A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over ...
Kiraz, Mehmet Sabir
core +1 more source
The Internet of Things (IoT), in spite of its innumerable advantages, brings many challenges namely issues about users' privacy preservation and constraints about lightweight cryptography.
AA Ciss +10 more
core +1 more source
Sustainable Network by Enhancing Attribute-Based Selection Mechanism Using Lagrange Interpolation
The security framework in Ad-hoc Networks (ANET) continues to attract the attention of researchers, although significant work has been accomplished already.
Chetna Monga +5 more
semanticscholar +1 more source
Biometric based Multi-Authority Inner Product Encryption for Electronic Health Record [PDF]
INTRODUCTION: Attribute-based encryption enhances the security of electronic health records outsourced to the cloud. At thesame time, single authority attribute based encryption leads to user privacy breech and attribute management complexity.Multi ...
C. Exceline, Jasmine Norman
doaj +1 more source
Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials
In this thesis we analyze two privacy-preserving attribute-based cryptographic primitives: attribute-based signatures (ABS) and updatable anonymous credentials (UAC). ABS schemes allow users to authenticate messages in a privacy-preserving manner while proving that their information encoded as attributes in their secret keys satisfy a policy.
openaire +1 more source

