Results 21 to 30 of about 607,071 (325)
Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage. [PDF]
Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly.
Shangping Wang +2 more
doaj +1 more source
In an attribute-based encryption, the user is identified with help of some attributes and their functions for encryption and decryption of the data. The current techniques based on attribute-based encryption have found that if user's access structure ...
Zhiyong Zhang +3 more
doaj +1 more source
Decentralizing multi-authority attribute-based encryption (ABE) has been adopted for solving problems arising from sharing confidential corporate data in cloud computing.
Yan Yang +3 more
doaj +1 more source
Fine-grained Home File Security Sharing Scheme Based on Attribute Encryption [PDF]
In the environment of home sharing,the user’s identity privacy may be leaked in the process of obtaining the file.To solve this problem,a fine-grained file sharing scheme based on attribute encryption is proposed.According to the needs of users,the ...
LIANG Cai,TU Guoqing,LIU Mengjun
doaj +1 more source
Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage
As is known, attribute-based encryption (ABE) is usually adopted for cloud storage, both for its achievement of fine-grained access control over data, and for its guarantee of data confidentiality.
Yang Ming, Baokang He, Chenhao Wang
doaj +1 more source
Attribute‐based encryption implies identity‐based encryption [PDF]
In this study, the author formally proves that designing attribute‐based encryption schemes cannot be easier than designing identity‐based encryption schemes. In more detail, they show how an attribute‐based encryption scheme which admits, at least, and policies can be combined with a ...
openaire +3 more sources
Biometric based Multi-Authority Inner Product Encryption for Electronic Health Record [PDF]
INTRODUCTION: Attribute-based encryption enhances the security of electronic health records outsourced to the cloud. At thesame time, single authority attribute based encryption leads to user privacy breech and attribute management complexity.Multi ...
C. Exceline, Jasmine Norman
doaj +1 more source
Multi-functional Attribute Based Encryption from Lattices [PDF]
Attribute based encryption from lattices has the property of resisting quantum attacks,and achieves fine-grained access control of attributes by cleverly embedding access control policies into ciphertext or keys.However,due to the inherent weaknesses of ...
GUO Lifeng, YANG Jieying, MA Tianjun, ZHANG Xialei
doaj +1 more source
An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network
Device-to-device communication is considered as one of the hopeful technologies for proximal communication, which plays a vital role in the wireless systems and 5G cellular networks.
Huawei Wang +3 more
doaj +1 more source
CP-ABE Scheme with Attribute Revocation Under Environment of Multi-attribute Authority [PDF]
For the attribute-based encryption scheme,a single authority has the problem of low efficiency and easy disclosure of user keys.Through the establishment of a decentralized attribute authority and agent reencryption technology,a Ciphertext-policy ...
ZHANG Yulei,LIU Wenjing,MA Yanli,WANG Caifen
doaj +1 more source

