Results 21 to 30 of about 40,263 (275)

R-PEKS: RBAC Enabled PEKS for Secure Access of Cloud Data [PDF]

open access: yes, 2019
In the recent past, few works have been done by combining attribute-based access control with multi-user PEKS, i.e., public key encryption with keyword search.
Asif, W.   +4 more
core   +3 more sources

Fine-grained Home File Security Sharing Scheme Based on Attribute Encryption [PDF]

open access: yesJisuanji gongcheng, 2018
In the environment of home sharing,the user’s identity privacy may be leaked in the process of obtaining the file.To solve this problem,a fine-grained file sharing scheme based on attribute encryption is proposed.According to the needs of users,the ...
LIANG Cai,TU Guoqing,LIU Mengjun
doaj   +1 more source

Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage

open access: yesIEEE Access, 2021
As is known, attribute-based encryption (ABE) is usually adopted for cloud storage, both for its achievement of fine-grained access control over data, and for its guarantee of data confidentiality.
Yang Ming, Baokang He, Chenhao Wang
doaj   +1 more source

Biometric based Multi-Authority Inner Product Encryption for Electronic Health Record [PDF]

open access: yesEAI Endorsed Transactions on Pervasive Health and Technology, 2020
INTRODUCTION: Attribute-based encryption enhances the security of electronic health records outsourced to the cloud. At thesame time, single authority attribute based encryption leads to user privacy breech and attribute management complexity.Multi ...
C. Exceline, Jasmine Norman
doaj   +1 more source

On the feasibility of attribute-based encryption on Internet of Things devices [PDF]

open access: yes, 2016
Attribute-based encryption (ABE) could be an effective cryptographic tool for the secure management of Internet of Things (IoT) devices, but its feasibility in the IoT has been under-investigated thus far.
AMbrosin, M   +6 more
core   +3 more sources

Forward-secure hierarchical predicate encryption [PDF]

open access: yes, 2012
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz
Gonzalez Nieto, Juan   +2 more
core   +2 more sources

AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption [PDF]

open access: yes, 2013
Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. However, those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned
Jung, Taeho   +3 more
core   +1 more source

Multi-functional Attribute Based Encryption from Lattices [PDF]

open access: yesJisuanji kexue
Attribute based encryption from lattices has the property of resisting quantum attacks,and achieves fine-grained access control of attributes by cleverly embedding access control policies into ciphertext or keys.However,due to the inherent weaknesses of ...
GUO Lifeng, YANG Jieying, MA Tianjun, ZHANG Xialei
doaj   +1 more source

Dodrant-Homomorphic Encryption for Cloud Databases using Table Lookup [PDF]

open access: yes, 2017
Users of large commercial databases increasingly want to outsource their database operations to a cloud service providers, but guaranteeing the privacy of data in an outsourced database has become the major obstacle to this move.
Schwarz, Thomas
core   +2 more sources

An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network

open access: yesInternational Journal of Distributed Sensor Networks, 2019
Device-to-device communication is considered as one of the hopeful technologies for proximal communication, which plays a vital role in the wireless systems and 5G cellular networks.
Huawei Wang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy