Results 1 to 10 of about 40,145 (157)

Attribute-based encryption implies identity-based encryption [PDF]

open access: yesIET Information Security, 2017
In this study, the author formally proves that designing attribute-based encryption schemes cannot be easier than designing identity-based encryption schemes.
Herranz Sotoca, Javier
core   +6 more sources

A keyword searchable attribute-based encryption scheme with attribute update for cloud storage. [PDF]

open access: yesPLoS ONE, 2018
Ciphertext-policy attribute-based encryption (CP-ABE) scheme is a new type of data encryption primitive, which is very suitable for data cloud storage for its fine-grained access control.
Shangping Wang, Jian Ye, Yaling Zhang
doaj   +2 more sources

Searchable attribute-based encryption scheme with attribute revocation in cloud storage. [PDF]

open access: yesPLoS ONE, 2017
Attribute based encryption (ABE) is a good way to achieve flexible and secure access control to data, and attribute revocation is the extension of the attribute-based encryption, and the keyword search is an indispensable part for cloud storage.
Shangping Wang   +2 more
doaj   +2 more sources

Comparison of attribute-based encryption schemes in securing healthcare systems [PDF]

open access: yesScientific Reports
E-health has become a top priority for healthcare organizations focused on advancing healthcare services. Thus, medical organizations have been widely adopting cloud services, resulting in the effective storage of sensitive data.
Redwan Walid   +2 more
doaj   +2 more sources

Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage. [PDF]

open access: yesPLoS ONE, 2018
With the development of outsourcing data services, data security has become an urgent problem that needs to be solved. Attribute-based encryption is a valid solution to data security in cloud storage.
Shangping Wang   +2 more
doaj   +2 more sources

Attacking Pairing-Free Attribute-Based Encryption Schemes [PDF]

open access: yesIEEE Access, 2020
Combining several results that have been published in the last years, it is known that it is impossible to design simple and secure attribute-based encryption schemes that work in (classical) settings like the RSA or the pairing-free discrete logarithm ...
Javier Herranz
doaj   +4 more sources

A smart grid data sharing scheme supporting policy update and traceability [PDF]

open access: yesScientific Reports
To address the problems of centralized attribute authority, inefficient encryption and invalid access control strategy in the data sharing scheme based on attribute-based encryption technology, a smart grid data sharing scheme that supports policy update
Xiaodong Yang   +4 more
doaj   +2 more sources

ABE Squared: Accurately Benchmarking Efficiency of Attribute-Based Encryption

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Measuring efficiency is difficult. In the last decades, several works have contributed in the quest to successfully determine and compare the efficiency of pairing-based attribute-based encryption (ABE) schemes. However, many of these works are limited:
Antonio de la Piedra   +2 more
doaj   +1 more source

Multiauthority Attribute-Based Encryption With Dynamic Membership From Lattices

open access: yesIEEE Access, 2022
Attribute-based encryption is useful for one-to-many encrypted message sending. However, most attribute-based encryption schemes authorize and issue attributes to users by a single authority.
Er-Shuo Zhuang, Chun-I Fan, I-Hua Kuo
doaj   +1 more source

Attribute-based encryption for circuits [PDF]

open access: yesProceedings of the forty-fifth annual ACM symposium on Theory of Computing, 2013
In an attribute-based encryption (ABE) scheme, a ciphertext is associated with an ℓ-bit public index ind and a message m , and a secret key is associated with a Boolean predicate P .
Gorbunov, Sergey   +2 more
openaire   +4 more sources

Home - About - Disclaimer - Privacy