Results 261 to 270 of about 607,071 (325)
Some of the next articles are maybe not open access.
Registered Attribute-Based Encryption
IACR Cryptology ePrint Archive, 2023Susan Hohenberger +3 more
openaire +2 more sources
Revocable Blockchain-Aided Attribute-Based Encryption With Escrow-Free in Cloud Storage
IEEE transactions on computers, 2023The massive amount of data generated by the Internet of Things (IoT) and the need to store that data presents a huge challenge for storage. However, meeting this challenge has also driven the development of storage technologies, especially those related ...
Yuyan Guo, Z. Lu, Hui Ge, Jiguo Li
semanticscholar +1 more source
Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data
IEEE Transactions on Cloud Computing, 2023In cloud data sharing systems, Searchable Encryption (SE) schemes ensure data confidentiality with retrieving, but it faces several issues in practice. First, most of the previous Ciphertext-Policy Attribute-Based Keyword Search (CP-ABKS) systems enable ...
Yinghui Zhang +5 more
semanticscholar +1 more source
IEEE Transactions on Dependable and Secure Computing, 2022
Considered as a promising fine-grained access control mechanism for data sharing without a centralized trusted third-party, the access policy in a plaintext form may reveal sensitive information in the traditional CP-ABE method.
Dezhi Han, N. Pan, Kuan Ching Li
semanticscholar +1 more source
Considered as a promising fine-grained access control mechanism for data sharing without a centralized trusted third-party, the access policy in a plaintext form may reveal sensitive information in the traditional CP-ABE method.
Dezhi Han, N. Pan, Kuan Ching Li
semanticscholar +1 more source
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT
IEEE Transactions on Cloud Computing, 2022The pervasive, ubiquitous, and heterogeneous properties of IoT make securing IoT systems a very challenging task. More so when access and storage are performed through a cloud-based IoT system.
Jiguo Li +5 more
semanticscholar +1 more source
Revocable Attribute-Based Encryption With Data Integrity in Clouds
IEEE Transactions on Dependable and Secure Computing, 2022Cloud computing enables enterprises and individuals to outsource and share their data. This way, cloud computing eliminates the heavy workload of local information infrastructure.
Chunpeng Ge +5 more
semanticscholar +1 more source
IEEE Journal on Selected Areas in Communications, 2023
Internet of Things (IoTs) has been a burgeoning field that transforms the ubiquitous objects to interconnected devices and intelligent system. Today, with the emerging of innovative technologies such as cloud computing, the IoT sector is in a race to ...
H. Xiong +3 more
semanticscholar +1 more source
Internet of Things (IoTs) has been a burgeoning field that transforms the ubiquitous objects to interconnected devices and intelligent system. Today, with the emerging of innovative technologies such as cloud computing, the IoT sector is in a race to ...
H. Xiong +3 more
semanticscholar +1 more source
A Delegatable Attribute Based Encryption Scheme for a Collaborative E-Health Cloud
IEEE Transactions on Services Computing, 2023With the popularization and growing utilization of electronic health records (EHRs) coupled with the advancements in cloud computing, healthcare providers are interested in storing EHRs in third-party, semi-trusted cloud platforms.
H. S. G. Pussewalage, V. Oleshchuk
semanticscholar +1 more source
2020
Sahai and Waters first introduced attribute-based encryption (ABE) as an extension of identity-based encryption (IBE), which allows the sender (who generates the ciphertext) to set a policy describing who can decrypt his ciphertext. Note that in an IBE system, a user is associated with a unique identity and can only decrypt the ciphertexts ...
Jiang Zhang, Zhenfeng Zhang
openaire +1 more source
Sahai and Waters first introduced attribute-based encryption (ABE) as an extension of identity-based encryption (IBE), which allows the sender (who generates the ciphertext) to set a policy describing who can decrypt his ciphertext. Note that in an IBE system, a user is associated with a unique identity and can only decrypt the ciphertexts ...
Jiang Zhang, Zhenfeng Zhang
openaire +1 more source
Attribute-Based Encryption for Circuits of Unbounded Depth from Lattices
IEEE Annual Symposium on Foundations of Computer Science, 2023Although we have known about fully homomorphic encryption (FHE) from circular security assumptions for over a decade [Gentry, FOCS ’10; Brakerski-Vaikuntanathan, STOC ’11], there is still a significant gap in understanding related homomorphic primitives ...
Yao-Ching Hsieh, Huijia Lin, Ji Luo
semanticscholar +1 more source

