Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures [PDF]
Content-Based Publish/Subscribe (CBPS) is an interaction model where the interests of subscribers are stored in a content-based forwarding infrastructure to guide routing of notifications to interested parties.
Raiciu, C, Rosenblum, DS
core +1 more source
CP-ABE Scheme with Attribute Revocation Under Environment of Multi-attribute Authority [PDF]
For the attribute-based encryption scheme,a single authority has the problem of low efficiency and easy disclosure of user keys.Through the establishment of a decentralized attribute authority and agent reencryption technology,a Ciphertext-policy ...
ZHANG Yulei,LIU Wenjing,MA Yanli,WANG Caifen
doaj +1 more source
Cloud Access Control Scheme Supporting Multi-authority Centers and Attribute Change [PDF]
The traditional Ciphertextpolicy Attribute-based Encryption(CP-ABE) systems are based on singleauthority organization,and most of them have the problems of large computation cost,low key maintenance efficiency,and inability to achieve anti-conspiracy ...
YANG Xiaodong,AN Faying,YANG Miaomiao,YANG Ping,WANG Caifen
doaj +1 more source
Privacy-Preserving and Outsourced Multi-User k-Means Clustering [PDF]
Many techniques for privacy-preserving data mining (PPDM) have been investigated over the past decade. Often, the entities involved in the data mining process are end-users or organizations with limited computing and storage resources.
Bertino, Elisa +4 more
core +3 more sources
Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems
Attribute-based encryption, especially for ciphertext-policy attribute-based encryption, can fulfill the functionality of fine-grained access control in cloud storage systems. Since users' attributes may be issued by multiple attribute authorities, multi-
Xiaoyu Li +4 more
doaj +1 more source
An Outsourced Attribute-Based Encryption Scheme Supporting Attribute Revocation [PDF]
Traditional Ciphertext-Policy Attribute-Based Encryption(CP-ABE) schemes have large computational overhead in key generation,decryption and attribute revocation processes.Aiming at this problem,this paper proposes an outsourced CP-ABE scheme which ...
LIU Zhusong,PENG Jiapeng
doaj +1 more source
Loc-Auth: Location-Enabled Authentication Through Attribute-Based Encryption
Traditional user authentication involves entering a username and password into a system. Strong authentication security demands, among other requirements, long, frequently hard-to-remember passwords.
Portnoi, Marcos, Shen, Chien-Chung
core +1 more source
Decentralizing Attribute-Based Encryption [PDF]
We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority and there is no requirement for any global coordination other than the creation of an initial set of common reference parameters. A party can simply act as an ABE authority by creating a public key and issuing private keys to different
Allison Lewko, Brent Waters
openaire +1 more source
Unified Ciphertext-Policy Weighted Attribute-Based Encryption for Sharing Data in Cloud Computing
With the rapid development of cloud computing, it is playing an increasingly important role in data sharing. Meanwhile, attribute-based encryption (ABE) has been an effective way to share data securely in cloud computing.
Wei Li +4 more
doaj +1 more source
Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation
Efficient user revocation is a necessary but challenging problem in many multi-user cryptosystems. Among known approaches, server-aided revocation yields a promising solution, because it allows to outsource the major workloads of system users to a ...
Ling, San +3 more
core +1 more source

