Results 1 to 10 of about 18,941 (248)

Searchable attribute-based encryption scheme with attribute revocation in cloud storage. [PDF]

open access: yesPLoS ONE, 2017
Attribute based encryption (ABE) is a good way to achieve flexible and secure access control to data, and attribute revocation is the extension of the attribute-based encryption, and the keyword search is an indispensable part for cloud storage.
Shangping Wang   +2 more
doaj   +5 more sources

A Lightweight CP-ABE Scheme with Direct Attribute Revocation for Vehicular Ad Hoc Network [PDF]

open access: yesEntropy, 2023
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) technology provides a new solution to address the security and fine-grained access control of traffic information in vehicular ad hoc networks (VANETs).
Yilong Liu, Shengwei Xu, Ziyan Yue
doaj   +2 more sources

Revocable and Traceable Decentralized ABE for P2P Networks [PDF]

open access: yesEntropy
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) technology provides fine-grained access control capabilities for P2P networks. However, its long-term development has been constrained by three major challenges: the trade-off between computational ...
Dan Gao, Huanhuan Xu, Shuqu Qian
doaj   +2 more sources

Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage. [PDF]

open access: yesPLoS ONE, 2016
Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly.
Shangping Wang   +2 more
doaj   +2 more sources

Revocable and Traceable Undeniable Attribute-Based Encryption in Cloud-Enabled E-Health Systems [PDF]

open access: yesEntropy, 2023
The emerging cloud storage technology has significantly improved efficiency and productivity in the traditional electronic healthcare field. However, it has also brought about many security concerns.
Zhongxiang He   +4 more
doaj   +2 more sources

Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage. [PDF]

open access: yesPLoS ONE, 2018
We propose an attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage environment, in which binary attributes and AND-gate access policy are used. Our proposal enjoys several advantages.
Shangping Wang, Lisha Yao, Yaling Zhang
doaj   +2 more sources

Attribute-based revocable collaborative access control scheme

open access: yesTongxin xuebao, 2021
To solve the dynamic update of access rights in attribute-based collaborative access control, a novel scheme was proposed with the revocation of attribute, user and collaborative policy.A formal definition and a security model were presented, the group ...
Changgen PENG   +4 more
doaj   +3 more sources

Efficient revocable attribute-based encryption scheme

open access: yesTongxin xuebao, 2019
In the existing solutions,the time-based scheme is difficult to achieve immediate revocation,and the third-party-based scheme often requires re-encryption,which needs large amount of calculation and doesn’t apply to mas-sive data.To solve the problem,an ...
Xuejun LI, Dan ZHANG, Hui LI
doaj   +3 more sources

Attribute-based encryption scheme supporting attribute revocation in cloud storage environment

open access: yesTongxin xuebao, 2019
Attribute-based encryption (ABE) scheme is widely used in the cloud storage due to its fine-grained access control.Each attribute in ABE may be shared by multiple users at the same time.Therefore,how to achieve attribute-level user revocation is ...
Lei SUN   +3 more
doaj   +3 more sources

Revocable attribute-based proxy re-encryption [PDF]

open access: yesJournal of Mathematical Cryptology, 2021
Abstract Attribute-based proxy re-encryption (ABPRE), which combines the notions of proxy re-encryption (PRE) and attribute-based encryption (ABE), allows a semi-trusted proxy with re-encryption key to transform a ciphertext under a particular access policy into a ciphertext under another access policy, without revealing any information ...
Luo Fucai, Al-Kuwari Saif
openaire   +3 more sources

Home - About - Disclaimer - Privacy