Results 231 to 240 of about 40,263 (275)
Some of the next articles are maybe not open access.
Dual-Policy Attribute Based Encryption
2009We present a new variant of Attribute based encryption (ABE) called Dual-Policy ABE. Basically, it is a conjunctively combined scheme between Key-Policy and Ciphertext-Policy ABE, the two previous available types of ABE. Dual-Policy ABE allows simultaneously two access control mechanisms over encrypted data: one involves policies over objective ...
Nuttapong Attrapadung, Hideki Imai
openaire +1 more source
Attribute-based encryption with encryption and decryption outsourcing
2014In this paper we propose a new scheme for ciphertext-policy attribute-based encryption that allows outsourcing of computationally expensive encryption and decryption steps. The scheme constitutes an important building block for mobile applications where both the host and users use mobile devices with limited computational power. In the proposed scheme,
Asim, M., Petkovic, M., Ignatenko, T.
openaire +2 more sources
Key Cooperative Attribute-Based Encryption
Attribute-based encryption (ABE) is an important technology in building access control systems with precise control and scalability. In an ABE system, there exists a private key generator (PKG) that issues all private keys. The PKG has a significant drawback referred to as the huge key management burden in large-scale user systems.HUANG, Luqi +3 more
openaire +2 more sources
Outsourcing Encryption of Attribute-Based Encryption with MapReduce
2012Attribute-based encryption (ABE) is a promising cryptographic tool for fine-grained access control. However, the computational cost in encryption commonly grows with the complexity of access policy in existing ABE schemes, which becomes a bottleneck limiting its application.
Jingwei Li +3 more
openaire +1 more source
Attribute-Based Broadcast Encryption Scheme Made Efficient
2008In this paper, we describe a new broadcast encryption scheme for stateless receivers. The main difference between our scheme and the classical ones derived from the complete subtree paradigm is that the group of privileged users is described by attributes.
Lubicz, David, Sirvent, Thomas
openaire +2 more sources
Hierarchical Identity-Based Encryption and Attribute-Based Encryption
2021Qianhong Wu, Hua Deng
openaire +1 more source
Ciphertext-Policy Attribute-Based Delay Encryption
International Journal of Information and Computer Security, 2022Lijiao Chen, Kewei Lv
openaire +1 more source

