Results 21 to 30 of about 40,456 (274)

Revocable Ciphertext-Policy Attribute-Based Encryption in Data Outsourcing Systems from Lattices

open access: yesJisuanji kexue yu tansuo, 2020
Attribute-based encryption mechanism is widely used in outsourcing environment because of its charac-teristics of “one-to-many” communication. However, users attributes often change dynamically.
YU Jinxia, YANG Chaochao, ZHANG Qichao, YAN Xixi
doaj   +1 more source

Mathematical Modeling of Static Data Attribute Encryption Based on Big Data Technology

open access: yesJournal of Function Spaces, 2022
Attribute encryption is an effective one to many network communication technologies, which supports flexible access control strategies and is very suitable for fine-grained access control in large-scale information systems.
Yutang Liu, Qin Zhang
doaj   +1 more source

How to Hide the Real Receiver Under the Cover Receiver: CP-ABE With Policy Deniability

open access: yesIEEE Access, 2020
Attribute-based encryption (ABE) is a useful tool for sharing an encrypted data to a target group. In a ciphertext-policy ABE (CP-ABE) scheme, a ciphertext includes a policy to indicate its receivers and only those receivers can correctly decrypt the ...
Po-Wen Chi, Ming-Hung Wang, Hung-Jr Shiu
doaj   +1 more source

Two-dimensional Code Hierarchical Encryption Algorithm Based on Attribute Encryption [PDF]

open access: yesJisuanji gongcheng, 2018
The two-dimensional code is only suitable for the transmission of single privilege information,cannot meet the needs of different permission users to gain the information.Using hierarchical encryption mode,the two-dimensional code information is ...
YANG Kang,YUAN Haidong,GUO Yuanbo
doaj   +1 more source

Data User-Based Attribute Based Encryption [PDF]

open access: yes2020 54th Annual Conference on Information Sciences and Systems (CISS), 2020
Attribute-Based Encryption (ABE) has emerged as an information-centric public-key cryptographic system which allows a data owner to share data, according to access policy, with multiple data users based on the attributes they possess, without knowing their identities.
Meamari, Ehsan   +3 more
openaire   +2 more sources

An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud

open access: yesInternational Journal of Distributed Sensor Networks, 2020
With the development of cloud computing, more and more video services are moving to the cloud. How to realize fine-grained access control of those data on cloud becomes an urgent problem. Attribute-based encryption provides a solution.
Hao Li   +3 more
doaj   +1 more source

Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage. [PDF]

open access: yesPLoS ONE, 2016
Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly.
Shangping Wang   +2 more
doaj   +1 more source

Efficient Compressed Ciphertext Length Scheme Using Multi-Authority CP-ABE for Hierarchical Attributes

open access: yesIEEE Access, 2018
In an attribute-based encryption, the user is identified with help of some attributes and their functions for encryption and decryption of the data. The current techniques based on attribute-based encryption have found that if user's access structure ...
Zhiyong Zhang   +3 more
doaj   +1 more source

Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing

open access: yesIEEE Access, 2018
Decentralizing multi-authority attribute-based encryption (ABE) has been adopted for solving problems arising from sharing confidential corporate data in cloud computing.
Yan Yang   +3 more
doaj   +1 more source

Forward-secure hierarchical predicate encryption [PDF]

open access: yes, 2012
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz
Gonzalez Nieto, Juan   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy