Results 1 to 10 of about 40,456 (274)

RLWE-based key-policy ABE scheme

open access: yesTongxin xuebao, 2016
Based on the attribute-based encryption(ABE) scheme which was proposed by Brakerski and constructed on the LWE problem,a RLWE-based key-policy ABE scheme was presented.Efficiency and key size of this scheme over-takes old ones which are based on the LWE ...
Ze-dong SUN   +3 more
doaj   +2 more sources

Flexible Attribute-Based Encryption [PDF]

open access: yes, 2012
In this paper, we propose a notion of flexible attribute-based encryption. Flexible attribute-based encryption is a variant of ciphertext-policy ABE, which allows one to loosen a decryption policy underlying a given ciphertext, if one knows some system-wide trapdoor information, without knowing its underlying plaintext message.
openaire   +1 more source

Survey Paper on CP-ABE cloud computing [PDF]

open access: yes, 2016
In attribute based encryption (ABE) scheme, attributes plays a very important role. Attribute –based encryption provides privacy protection for the users by a set of attributes.
Pawar, P. G. (Poornima)   +1 more
core  

Efficient Attribute-Based Encryption Outsourcing Scheme With User and Attribute Revocation for Fog-Enabled IoT

open access: yesIEEE Access, 2020
With the rapid growth of Internet of Things (IoT) applications, fog computing enables the IoT to provide efficient services by extending the cloud computing paradigm to the edge of the network.
Ling Li, Zheng Wang, Na Li
doaj   +1 more source

Revocable attribute-based proxy re-encryption

open access: yesJournal of Mathematical Cryptology, 2021
Attribute-based proxy re-encryption (ABPRE), which combines the notions of proxy re-encryption (PRE) and attribute-based encryption (ABE), allows a semi-trusted proxy with re-encryption key to transform a ciphertext under a particular access policy into ...
Luo Fucai, Al-Kuwari Saif
doaj   +1 more source

Multi-authority attribute-based encryption access control model for cloud storage

open access: yesTongxin xuebao, 2015
The existing attribute-based encryption access control studies are mostly based on single authority,and this scheme is apt to be under attack to cause exposure of secret keys.Thus,a multi-authority access control model PRM-CSAC is proposed.Based on CP ...
Zhi-tao GUAN   +3 more
doaj   +2 more sources

Enhancing Attribute-Based Encryption with Attribute Hierarchy [PDF]

open access: yesMobile Networks and Applications, 2009
Attribute-based encryption (ABE) has been envisioned as a promising cryptographic primitive for realizing secure and flexible access control. However, ABE is being criticized for its high scheme overhead as extensive pairing operations are usually required. In this paper, we focus on improving the efficiency of ABE by leveraging a previously overlooked
Jin Li, Qian Wang, Cong Wang, Kui Ren
openaire   +1 more source

Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption [PDF]

open access: yesJournal of Universal Computer Science, 2019
Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data provider encrypts a secret message and then sends the ciphertext to the receivers according to the access policy which she/he decides.
Yi-Fan Tseng, Chun-I Fan, Chih-Wen Lin
doaj   +3 more sources

Reconfigurable Security: Edge Computing-based Framework for IoT

open access: yes, 2017
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications.
Chen, Jyh-Cheng   +3 more
core   +1 more source

Targeted Homomorphic Attribute-Based Encryption

open access: yes, 2016
In key-policy attribute-based encryption ABE, messages are encrypted respective to attributes x, and keys are generated respective to policy functions f. The ciphertext is decryptable by a key only if $$fx=0$$fx=0. Adding homomorphic capabilities to ABE is a long standing open problem, with current techniques only allowing compact homomorphic ...
Brakerski, Zvika   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy