Results 271 to 280 of about 607,071 (325)
Some of the next articles are maybe not open access.

Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation

IEEE Transactions on Services Computing, 2023
Cloud computing, which provides a brand-new service model, has become an important infrastructure in the information age, and has been widely used in numerous fields.
Dilxat Ghopur   +5 more
semanticscholar   +1 more source

Efficient Revocable Storage Attribute-based Encryption With Arithmetic Span Programs in Cloud-Assisted Internet of Things

IEEE Transactions on Cloud Computing, 2023
Revocable storage and efficient description of the access policy are necessary to enhance the practicality of the attribute-based encryption (ABE) in real-life scenarios, such as cloud-assisted Internet of Things (IoT).
Xin Huang   +3 more
semanticscholar   +1 more source

Multiauthority Attribute-Based Encryption for Assuring Data Deletion

IEEE Systems Journal, 2023
In order to alleviate key escrow issue, the notion of multiauthority attribute-based encryption (MA-ABE) was presented, which was widely applied in cloud storage environment.
Jiguo Li   +6 more
semanticscholar   +1 more source

Deterministic attribute-based encryption

International Journal of High Performance Computing and Networking, 2016
Attribute-based encryption enables data owners to share their information by specifying access control policies while outsourcing their encrypted data to the cloud. However, there are no efficient searchable schemes over encrypted data in attribute-based setting.
Yanfeng Shi   +3 more
openaire   +1 more source

PH-MG-ABE: A Flexible Policy-Hidden Multigroup Attribute-Based Encryption Scheme for Secure Cloud Storage

IEEE Internet of Things Journal
Ciphertext-policy attribute-based encryption (CP-ABE) has attracted significant attention due to its fine-grained access control capabilities, which are highly compatible with cloud computing.
Jiguo Li   +4 more
semanticscholar   +1 more source

Attribute-Based Encryption

2009
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data is that it can be selectively shared only at a coarse-grained level (i.e., giving another party your private key).
Sahai Amit, Waters Brent, Lu Steve
openaire   +1 more source

RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage

IEEE Transactions on Services Computing, 2022
In this article, we propose a revocable lattice-based CP-ABE (Ciphertext-Policy Attribute-Based Encryption) scheme (RL-ABE), which is suitable to be applied in the cloud storage.
Siyu Zhao, R. Jiang, B. Bhargava
semanticscholar   +1 more source

Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract

IEEE Transactions on Dependable and Secure Computing
Outsourcing the heavy decryption computation to a cloud service provider has been a promising solution for a resource-constrained mobile device to deploy an attribute-based encryption scheme.
Chunpeng Ge   +4 more
semanticscholar   +1 more source

Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health System

IEEE Transactions on Dependable and Secure Computing
The cloud-assisted mobile electronic health (e-health) system facilitates e-health data sharing between healthcare providers and patients, but also raises the security and privacy concerns of e-health data.
Yinbin Miao   +6 more
semanticscholar   +1 more source

Attribute-Based Encryption With Blockchain Protection Scheme for Electronic Health Records

IEEE Transactions on Network and Service Management, 2022
In medical scenarios supported by edge clouds, it is difficult for patients to truly gain ownership of their electronic health records (EHRs). However, it is easy for doctors to modify hospital data to deny incorrect treatment records, which makes it ...
Yuzhang Jiang, Xiaolong Xu, Fu Xiao
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy