Results 1 to 10 of about 40,456 (274)
RLWE-based key-policy ABE scheme
Based on the attribute-based encryption(ABE) scheme which was proposed by Brakerski and constructed on the LWE problem,a RLWE-based key-policy ABE scheme was presented.Efficiency and key size of this scheme over-takes old ones which are based on the LWE ...
Ze-dong SUN +3 more
doaj +2 more sources
Flexible Attribute-Based Encryption [PDF]
In this paper, we propose a notion of flexible attribute-based encryption. Flexible attribute-based encryption is a variant of ciphertext-policy ABE, which allows one to loosen a decryption policy underlying a given ciphertext, if one knows some system-wide trapdoor information, without knowing its underlying plaintext message.
openaire +1 more source
Survey Paper on CP-ABE cloud computing [PDF]
In attribute based encryption (ABE) scheme, attributes plays a very important role. Attribute –based encryption provides privacy protection for the users by a set of attributes.
Pawar, P. G. (Poornima) +1 more
core
With the rapid growth of Internet of Things (IoT) applications, fog computing enables the IoT to provide efficient services by extending the cloud computing paradigm to the edge of the network.
Ling Li, Zheng Wang, Na Li
doaj +1 more source
Revocable attribute-based proxy re-encryption
Attribute-based proxy re-encryption (ABPRE), which combines the notions of proxy re-encryption (PRE) and attribute-based encryption (ABE), allows a semi-trusted proxy with re-encryption key to transform a ciphertext under a particular access policy into ...
Luo Fucai, Al-Kuwari Saif
doaj +1 more source
Multi-authority attribute-based encryption access control model for cloud storage
The existing attribute-based encryption access control studies are mostly based on single authority,and this scheme is apt to be under attack to cause exposure of secret keys.Thus,a multi-authority access control model PRM-CSAC is proposed.Based on CP ...
Zhi-tao GUAN +3 more
doaj +2 more sources
Enhancing Attribute-Based Encryption with Attribute Hierarchy [PDF]
Attribute-based encryption (ABE) has been envisioned as a promising cryptographic primitive for realizing secure and flexible access control. However, ABE is being criticized for its high scheme overhead as extensive pairing operations are usually required. In this paper, we focus on improving the efficiency of ABE by leveraging a previously overlooked
Jin Li, Qian Wang, Cong Wang, Kui Ren
openaire +1 more source
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption [PDF]
Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data provider encrypts a secret message and then sends the ciphertext to the receivers according to the access policy which she/he decides.
Yi-Fan Tseng, Chun-I Fan, Chih-Wen Lin
doaj +3 more sources
Reconfigurable Security: Edge Computing-based Framework for IoT
In various scenarios, achieving security between IoT devices is challenging since the devices may have different dedicated communication standards, resource constraints as well as various applications.
Chen, Jyh-Cheng +3 more
core +1 more source
Targeted Homomorphic Attribute-Based Encryption
In key-policy attribute-based encryption ABE, messages are encrypted respective to attributes x, and keys are generated respective to policy functions f. The ciphertext is decryptable by a key only if $$fx=0$$fx=0. Adding homomorphic capabilities to ABE is a long standing open problem, with current techniques only allowing compact homomorphic ...
Brakerski, Zvika +3 more
openaire +2 more sources

