Cloud Access Control Scheme Supporting Multi-authority Centers and Attribute Change [PDF]
The traditional Ciphertextpolicy Attribute-based Encryption(CP-ABE) systems are based on singleauthority organization,and most of them have the problems of large computation cost,low key maintenance efficiency,and inability to achieve anti-conspiracy ...
YANG Xiaodong,AN Faying,YANG Miaomiao,YANG Ping,WANG Caifen
doaj +1 more source
Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems
Attribute-based encryption, especially for ciphertext-policy attribute-based encryption, can fulfill the functionality of fine-grained access control in cloud storage systems. Since users' attributes may be issued by multiple attribute authorities, multi-
Xiaoyu Li +4 more
doaj +1 more source
An Outsourced Attribute-Based Encryption Scheme Supporting Attribute Revocation [PDF]
Traditional Ciphertext-Policy Attribute-Based Encryption(CP-ABE) schemes have large computational overhead in key generation,decryption and attribute revocation processes.Aiming at this problem,this paper proposes an outsourced CP-ABE scheme which ...
LIU Zhusong,PENG Jiapeng
doaj +1 more source
Unified Ciphertext-Policy Weighted Attribute-Based Encryption for Sharing Data in Cloud Computing
With the rapid development of cloud computing, it is playing an increasingly important role in data sharing. Meanwhile, attribute-based encryption (ABE) has been an effective way to share data securely in cloud computing.
Wei Li +4 more
doaj +1 more source
An Attribute Multiple Encryption Scheme Based on Lattices [PDF]
In order to improve the operating efficiency and the security of encryption and decryption of attribute encryption system,the theory of lattice instead of bilinear pairings is used to reduce the computational complexity of encryption and decryption ...
TANG Haiting,WANG Xueming
doaj +1 more source
FABEO: Fast Attribute-Based Encryption with Optimal Security
Attribute-based encryption (ABE) enables fine-grained access control on encrypted data and has a large number of practical applications. This paper presents FABEO: faster pairing-based ciphertext-policy and key-policy ABE schemes that support expressive ...
Doreen Riepel, H. Wee
semanticscholar +1 more source
The convenience and efficient management of cloud servers have resulted in an increasing number of users opting to store their data in the cloud. Consequently, data-outsourcing services relying on cloud servers have been extensively deployed and utilized.
Hua Shen, Jian Zhou, Ge Wu, Mingwu Zhang
doaj +1 more source
By dawn or dusk—how circadian timing rewrites bacterial infection outcomes
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo +2 more
wiley +1 more source
Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions
Privacy and security are the most important issues to the popularity of cloud computing service. In recent years, there are many research schemes of cloud computing privacy protection based on access control, attribute-based encryption (ABE), trust and ...
Pan Jun Sun
doaj +1 more source
Crosstalk between the ribosome quality control‐associated E3 ubiquitin ligases LTN1 and RNF10
Loss of the E3 ligase LTN1, the ubiquitin‐like modifier UFM1, or the deubiquitinating enzyme UFSP2 disrupts endoplasmic reticulum–ribosome quality control (ER‐RQC), a pathway that removes stalled ribosomes and faulty proteins. This disruption may trigger a compensatory response to ER‐RQC defects, including increased expression of the E3 ligase RNF10 ...
Yuxi Huang +8 more
wiley +1 more source

