Results 221 to 230 of about 40,263 (275)

MSD: Multi-stage deception for data privacy protection. [PDF]

open access: yesPLoS One
Abdel Latif Ali T, Elsherbini MM.
europepmc   +1 more source

Attribute-Based Encryption

2021
In today’s world data is growing enormously. With the advancement in data, there is need of effective data security mechanism to handle this stored or transmitted information. This necessity introduced science of cryptography. Being an effective cryptographic system attribute-based encryption (ABE) became hot topic of research among the researchers ...
Seong Oun Hwang, Intae Kim, Wai Kong Lee
  +4 more sources

Fine-Grained Secure Attribute-Based Encryption

Journal of Cryptology, 2021
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yuyu Wang, Jiaxin Pan, Yu Chen
openaire   +1 more source

Attribute-Based Encryption

2020
Sahai and Waters first introduced attribute-based encryption (ABE) as an extension of identity-based encryption (IBE), which allows the sender (who generates the ciphertext) to set a policy describing who can decrypt his ciphertext. Note that in an IBE system, a user is associated with a unique identity and can only decrypt the ciphertexts ...
Jiang Zhang, Zhenfeng Zhang
openaire   +1 more source

Deterministic attribute-based encryption

International Journal of High Performance Computing and Networking, 2016
Attribute-based encryption enables data owners to share their information by specifying access control policies while outsourcing their encrypted data to the cloud. However, there are no efficient searchable schemes over encrypted data in attribute-based setting.
Yanfeng Shi   +3 more
openaire   +1 more source

Attribute-Based Encryption

2009
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data is that it can be selectively shared only at a coarse-grained level (i.e., giving another party your private key).
Sahai Amit, Waters Brent, Lu Steve
openaire   +1 more source

Distributed Attribute-Based Encryption

2009
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows to encrypt data under an access policy, specified as a logical combination of attributes. Such ciphertexts can be decrypted by anyone with a set of attributes that fits the policy. In this paper, we introduce the concept of Distributed Attribute-Based Encryption (DABE), where an arbitrary ...
Sascha Müller   +2 more
openaire   +1 more source

Attribute-Based Symmetric Searchable Encryption

2020
Symmetric Searchable Encryption (SSE) is an encryption technique that allows users to search directly on their outsourced encrypted data while preserving the privacy of both the files and the queries. Unfortunately, majority of the SSE schemes allows users to either decrypt the whole ciphertext or nothing at all.
Dang, Hai-Van   +3 more
openaire   +1 more source

Fast, Compact, and Expressive Attribute-Based Encryption

Designs, Codes and Cryptography, 2020
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Junichi Tomida   +2 more
openaire   +1 more source

On Anonymous Attribute Based Encryption

2015
Attribute Based Encryption ABE has found enormous scope in data confidentiality and fine-grained access control of shared data stored in public cloud. Classical ABE schemes require attaching the access policy along with the ciphertext, where the access policy describes required attribute values of a receiver.
Payal Chaudhari   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy