Results 31 to 40 of about 40,263 (275)

Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures [PDF]

open access: yes, 2006
Content-Based Publish/Subscribe (CBPS) is an interaction model where the interests of subscribers are stored in a content-based forwarding infrastructure to guide routing of notifications to interested parties.
Raiciu, C, Rosenblum, DS
core   +1 more source

CP-ABE Scheme with Attribute Revocation Under Environment of Multi-attribute Authority [PDF]

open access: yesJisuanji gongcheng, 2018
For the attribute-based encryption scheme,a single authority has the problem of low efficiency and easy disclosure of user keys.Through the establishment of a decentralized attribute authority and agent reencryption technology,a Ciphertext-policy ...
ZHANG Yulei,LIU Wenjing,MA Yanli,WANG Caifen
doaj   +1 more source

Cloud Access Control Scheme Supporting Multi-authority Centers and Attribute Change [PDF]

open access: yesJisuanji gongcheng, 2018
The traditional Ciphertextpolicy Attribute-based Encryption(CP-ABE) systems are based on singleauthority organization,and most of them have the problems of large computation cost,low key maintenance efficiency,and inability to achieve anti-conspiracy ...
YANG Xiaodong,AN Faying,YANG Miaomiao,YANG Ping,WANG Caifen
doaj   +1 more source

Privacy-Preserving and Outsourced Multi-User k-Means Clustering [PDF]

open access: yes, 2014
Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Often, the entities involved in the data mining process are end-users or organizations with limited computing and storage resources.
Bertino, Elisa   +4 more
core   +3 more sources

Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems

open access: yesIEEE Access, 2017
Attribute-based encryption, especially for ciphertext-policy attribute-based encryption, can fulfill the functionality of fine-grained access control in cloud storage systems. Since users' attributes may be issued by multiple attribute authorities, multi-
Xiaoyu Li   +4 more
doaj   +1 more source

An Outsourced Attribute-Based Encryption Scheme Supporting Attribute Revocation [PDF]

open access: yesJisuanji gongcheng, 2017
Traditional Ciphertext-Policy Attribute-Based Encryption(CP-ABE) schemes have large computational overhead in key generation,decryption and attribute revocation processes.Aiming at this problem,this paper proposes an outsourced CP-ABE scheme which ...
LIU Zhusong,PENG Jiapeng
doaj   +1 more source

Loc-Auth: Location-Enabled Authentication Through Attribute-Based Encryption

open access: yes, 2014
Traditional user authentication involves entering a username and password into a system. Strong authentication security demands, among other requirements, long, frequently hard-to-remember passwords.
Portnoi, Marcos, Shen, Chien-Chung
core   +1 more source

Decentralizing Attribute-Based Encryption [PDF]

open access: yes, 2011
We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority and there is no requirement for any global coordination other than the creation of an initial set of common reference parameters. A party can simply act as an ABE authority by creating a public key and issuing private keys to different
Allison Lewko, Brent Waters
openaire   +1 more source

Unified Ciphertext-Policy Weighted Attribute-Based Encryption for Sharing Data in Cloud Computing

open access: yesApplied Sciences, 2018
With the rapid development of cloud computing, it is playing an increasingly important role in data sharing. Meanwhile, attribute-based encryption (ABE) has been an effective way to share data securely in cloud computing.
Wei Li   +4 more
doaj   +1 more source

Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation

open access: yes, 2018
Efficient user revocation is a necessary but challenging problem in many multi-user cryptosystems. Among known approaches, server-aided revocation yields a promising solution, because it allows to outsource the major workloads of system users to a ...
Ling, San   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy