Results 1 to 10 of about 607,071 (325)

Comparison of attribute-based encryption schemes in securing healthcare systems [PDF]

open access: yesScientific Reports
E-health has become a top priority for healthcare organizations focused on advancing healthcare services. Thus, medical organizations have been widely adopting cloud services, resulting in the effective storage of sensitive data.
Redwan Walid   +2 more
doaj   +3 more sources

Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing. [PDF]

open access: yesJ Cloud Comput (Heidelb), 2023
Cloud file sharing (CFS) has become one of the important tools for enterprises to reduce technology operating costs and improve their competitiveness. Due to the untrustworthy cloud service provider, access control and security issues for sensitive data ...
Huang B, Gao J, Li X.
europepmc   +2 more sources

A Survey on Attribute-Based Encryption Schemes Suitable for the Internet of Things [PDF]

open access: hybridIEEE Internet of Things Journal, 2022
The Internet of Things (IoT) is an information service paradigm based on the integration of smart objects, mobile devices, and computers via the Internet.
Marco Rasori   +3 more
openalex   +2 more sources

A keyword searchable attribute-based encryption scheme with attribute update for cloud storage. [PDF]

open access: yesPLoS ONE, 2018
Ciphertext-policy attribute-based encryption (CP-ABE) scheme is a new type of data encryption primitive, which is very suitable for data cloud storage for its fine-grained access control.
Shangping Wang, Jian Ye, Yaling Zhang
doaj   +2 more sources

Ciphertext-Policy Attribute-Based Encryption [PDF]

open access: yes2007 IEEE Symposium on Security and Privacy (SP '07), 2007
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such policies is to employ a trusted server to store the data and mediate access control.
John Bethencourt   +2 more
openaire   +2 more sources

Searchable attribute-based encryption scheme with attribute revocation in cloud storage. [PDF]

open access: yesPLoS ONE, 2017
Attribute based encryption (ABE) is a good way to achieve flexible and secure access control to data, and attribute revocation is the extension of the attribute-based encryption, and the keyword search is an indispensable part for cloud storage.
Shangping Wang   +2 more
doaj   +2 more sources

Decentralizing Attribute-Based Encryption [PDF]

open access: yesIACR Cryptology ePrint Archive, 2011
We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority and there is no requirement for any global coordination other than the creation of an initial set of common reference parameters. A party can simply act as an ABE authority by creating a public key and issuing private keys to different
Allison Lewko, Brent Waters
openaire   +2 more sources

Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage. [PDF]

open access: yesPLoS ONE, 2018
With the development of outsourcing data services, data security has become an urgent problem that needs to be solved. Attribute-based encryption is a valid solution to data security in cloud storage.
Shangping Wang   +2 more
doaj   +2 more sources

Attacking Pairing-Free Attribute-Based Encryption Schemes [PDF]

open access: yesIEEE Access, 2020
Combining several results that have been published in the last years, it is known that it is impossible to design simple and secure attribute-based encryption schemes that work in (classical) settings like the RSA or the pairing-free discrete logarithm ...
Javier Herranz
doaj   +4 more sources

A smart grid data sharing scheme supporting policy update and traceability [PDF]

open access: yesScientific Reports
To address the problems of centralized attribute authority, inefficient encryption and invalid access control strategy in the data sharing scheme based on attribute-based encryption technology, a smart grid data sharing scheme that supports policy update
Xiaodong Yang   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy