Multi-authority Attribute Based Encryption [PDF]
In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in which each user is identified by a set of attributes, and some function of those attributes is used to determine decryption ability for each ciphertext. Sahai and Waters introduced a single
openaire +1 more source
Large Universe Attribute-Based Encryption Scheme from Lattices [PDF]
Shangping Wang, Fang Feng
openalex +1 more source
ABSTRACT Background Myasthenia gravis (MG) is a rare disorder characterized by fluctuating muscle weakness with potential life‐threatening crises. Timely interventions may be delayed by limited access to care and fragmented documentation. Our objective was to develop predictive algorithms for MG deterioration using multimodal telemedicine data ...
Maike Stein +7 more
wiley +1 more source
Secure Power Data Sharing with Fine-grained Control: A Multi-strategy Access Tree Approach [PDF]
The current data sharing schemes mainly employ Attribute-Based Encryption (ABE) technique to achieve one-to-many access control for power data. However, these schemes suffer from issues such as low encryption efficiency and vulnerability to user ...
Z. Y. Jiang +3 more
doaj
Revocable and Traceable Undeniable Attribute-Based Encryption in Cloud-Enabled E-Health Systems. [PDF]
He Z, Chen Y, Luo Y, Zhang L, Tang Y.
europepmc +1 more source
Discovery and Targeted Proteomic Studies Reveal Striatal Markers Validated for Huntington's Disease
ABSTRACT Objective Clinical trials for Huntington's disease (HD) enrolling persons before clinical motor diagnosis (CMD) lack validated biomarkers. This study aimed to conduct an unbiased discovery analysis and a targeted examination of proteomic biomarkers scrutinized by clinical validation. Methods Cerebrospinal fluid was obtained from PREDICT‐HD and
Daniel Chelsky +8 more
wiley +1 more source
An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption. [PDF]
Hu R +6 more
europepmc +1 more source
Glymphatic Dysfunction Reflects Post‐Concussion Symptoms: Changes Within 1 Month and After 3 Months
ABSTRACT Objective Mild traumatic brain injury (mTBI) may alter glymphatic function; however, its progression and variability remain obscure. This study examined glymphatic function following mTBI within 1 month and after 3 months post‐injury to determine whether variations in glymphatic function are associated with post‐traumatic symptom severity ...
Eunkyung Kim +3 more
wiley +1 more source
A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain. [PDF]
Yang X, Li W, Fan K.
europepmc +1 more source
Developmental, Neuroanatomical and Cellular Expression of Genes Causing Dystonia
ABSTRACT Objective Dystonia is one of the most common movement disorders, with variants in multiple genes identified as causative. However, an understanding of which developmental stages, brain regions, and cell types are most relevant is crucial for developing relevant disease models and therapeutics.
Darren Cameron +5 more
wiley +1 more source

