Results 11 to 20 of about 40,263 (275)

Revocable Ciphertext-Policy Attribute-Based Encryption in Data Outsourcing Systems from Lattices

open access: yesJisuanji kexue yu tansuo, 2020
Attribute-based encryption mechanism is widely used in outsourcing environment because of its charac-teristics of “one-to-many” communication. However, users attributes often change dynamically.
YU Jinxia, YANG Chaochao, ZHANG Qichao, YAN Xixi
doaj   +1 more source

Mathematical Modeling of Static Data Attribute Encryption Based on Big Data Technology

open access: yesJournal of Function Spaces, 2022
Attribute encryption is an effective one to many network communication technologies, which supports flexible access control strategies and is very suitable for fine-grained access control in large-scale information systems.
Yutang Liu, Qin Zhang
doaj   +1 more source

How to Hide the Real Receiver Under the Cover Receiver: CP-ABE With Policy Deniability

open access: yesIEEE Access, 2020
Attribute-based encryption (ABE) is a useful tool for sharing an encrypted data to a target group. In a ciphertext-policy ABE (CP-ABE) scheme, a ciphertext includes a policy to indicate its receivers and only those receivers can correctly decrypt the ...
Po-Wen Chi, Ming-Hung Wang, Hung-Jr Shiu
doaj   +1 more source

Two-dimensional Code Hierarchical Encryption Algorithm Based on Attribute Encryption [PDF]

open access: yesJisuanji gongcheng, 2018
The two-dimensional code is only suitable for the transmission of single privilege information,cannot meet the needs of different permission users to gain the information.Using hierarchical encryption mode,the two-dimensional code information is ...
YANG Kang,YUAN Haidong,GUO Yuanbo
doaj   +1 more source

Data User-Based Attribute Based Encryption [PDF]

open access: yes2020 54th Annual Conference on Information Sciences and Systems (CISS), 2020
Attribute-Based Encryption (ABE) has emerged as an information-centric public-key cryptographic system which allows a data owner to share data, according to access policy, with multiple data users based on the attributes they possess, without knowing their identities.
Meamari, Ehsan   +3 more
openaire   +2 more sources

An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud

open access: yesInternational Journal of Distributed Sensor Networks, 2020
With the development of cloud computing, more and more video services are moving to the cloud. How to realize fine-grained access control of those data on cloud becomes an urgent problem. Attribute-based encryption provides a solution.
Hao Li   +3 more
doaj   +1 more source

Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage. [PDF]

open access: yesPLoS ONE, 2016
Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly.
Shangping Wang   +2 more
doaj   +1 more source

On Using Encryption Techniques to Enhance Sticky Policies Enforcement [PDF]

open access: yes, 2008
How to enforce privacy policies to protect sensitive personal data has become an urgent research topic for security researchers, as very little has been done in this field apart from some ad hoc research efforts.
Tang, Qiang
core   +9 more sources

Efficient Compressed Ciphertext Length Scheme Using Multi-Authority CP-ABE for Hierarchical Attributes

open access: yesIEEE Access, 2018
In an attribute-based encryption, the user is identified with help of some attributes and their functions for encryption and decryption of the data. The current techniques based on attribute-based encryption have found that if user's access structure ...
Zhiyong Zhang   +3 more
doaj   +1 more source

Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing

open access: yesIEEE Access, 2018
Decentralizing multi-authority attribute-based encryption (ABE) has been adopted for solving problems arising from sharing confidential corporate data in cloud computing.
Yan Yang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy