Results 11 to 20 of about 607,071 (325)

Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption [PDF]

open access: greenJournal of Universal Computer Science, 2019
Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data provider encrypts a secret message and then sends the ciphertext to the receivers according to the access policy which she/he decides.
Yi-Fan Tseng, Chun-I Fan, Chih-Wen Lin
doaj   +5 more sources

ABE Squared: Accurately Benchmarking Efficiency of Attribute-Based Encryption

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Measuring efficiency is difficult. In the last decades, several works have contributed in the quest to successfully determine and compare the efficiency of pairing-based attribute-based encryption (ABE) schemes. However, many of these works are limited:
Antonio de la Piedra   +2 more
doaj   +1 more source

Multiauthority Attribute-Based Encryption With Dynamic Membership From Lattices

open access: yesIEEE Access, 2022
Attribute-based encryption is useful for one-to-many encrypted message sending. However, most attribute-based encryption schemes authorize and issue attributes to users by a single authority.
Er-Shuo Zhuang, Chun-I Fan, I-Hua Kuo
doaj   +1 more source

Attribute-based encryption for circuits [PDF]

open access: yesProceedings of the forty-fifth annual ACM symposium on Theory of Computing, 2013
In an attribute-based encryption (ABE) scheme, a ciphertext is associated with an ℓ-bit public index ind and a message m , and a secret key is associated with a Boolean predicate P .
Gorbunov, Sergey   +2 more
openaire   +4 more sources

Revocable Ciphertext-Policy Attribute-Based Encryption in Data Outsourcing Systems from Lattices

open access: yesJisuanji kexue yu tansuo, 2020
Attribute-based encryption mechanism is widely used in outsourcing environment because of its charac-teristics of “one-to-many” communication. However, users attributes often change dynamically.
YU Jinxia, YANG Chaochao, ZHANG Qichao, YAN Xixi
doaj   +1 more source

Mathematical Modeling of Static Data Attribute Encryption Based on Big Data Technology

open access: yesJournal of Function Spaces, 2022
Attribute encryption is an effective one to many network communication technologies, which supports flexible access control strategies and is very suitable for fine-grained access control in large-scale information systems.
Yutang Liu, Qin Zhang
doaj   +1 more source

How to Hide the Real Receiver Under the Cover Receiver: CP-ABE With Policy Deniability

open access: yesIEEE Access, 2020
Attribute-based encryption (ABE) is a useful tool for sharing an encrypted data to a target group. In a ciphertext-policy ABE (CP-ABE) scheme, a ciphertext includes a policy to indicate its receivers and only those receivers can correctly decrypt the ...
Po-Wen Chi, Ming-Hung Wang, Hung-Jr Shiu
doaj   +1 more source

Two-dimensional Code Hierarchical Encryption Algorithm Based on Attribute Encryption [PDF]

open access: yesJisuanji gongcheng, 2018
The two-dimensional code is only suitable for the transmission of single privilege information,cannot meet the needs of different permission users to gain the information.Using hierarchical encryption mode,the two-dimensional code information is ...
YANG Kang,YUAN Haidong,GUO Yuanbo
doaj   +1 more source

Data User-Based Attribute Based Encryption [PDF]

open access: yes2020 54th Annual Conference on Information Sciences and Systems (CISS), 2020
Attribute-Based Encryption (ABE) has emerged as an information-centric public-key cryptographic system which allows a data owner to share data, according to access policy, with multiple data users based on the attributes they possess, without knowing their identities.
Meamari, Ehsan   +3 more
openaire   +2 more sources

An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud

open access: yesInternational Journal of Distributed Sensor Networks, 2020
With the development of cloud computing, more and more video services are moving to the cloud. How to realize fine-grained access control of those data on cloud becomes an urgent problem. Attribute-based encryption provides a solution.
Hao Li   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy