Results 11 to 20 of about 18,941 (248)

Reusable attribute-based signature with attribute revocation and authenticated key agreement

open access: yes网络与信息安全学报
In the pursuit of establishing a unified model for fine-grained access control and secure data communication within a distributed microservices architecture, a verifier-policy attributed-based signature (VP-ABS) scheme, augmented with attribute ...
Zhishuo ZHANG, Huixi YANG, Wen HUANG, Yongjian LIAO, Shijie ZHOU
doaj   +4 more sources

A Personal Privacy Data Protection Scheme for Encryption and Revocation of High-Dimensional Attribute Domains

open access: yesIEEE Access, 2023
With the frequent occurrence of private data breaches, it is now more necessary than ever to address how to protect private data. The combination of Ciphertext-Policy Attribute-Based Encryption (CP-ABE) and blockchain typically enables secure storage and
Caimei Wang   +5 more
doaj   +1 more source

Lazy-mode Ciphertext-update Based Approach for CP-ABE Attribute Change [PDF]

open access: yesJisuanji kexue, 2022
Ciphertext-policy attribute-based encryption(CP-ABE) can be used to realize secure data sharing in cloud computing environments.However,user attribute change(attribute revocation and addition) in CP-ABE is a tricky problem.Generally,attribute change is ...
LEI Xue-jiao, WANG Yin-long, Nurmamat HELIL
doaj   +1 more source

An Outsourced Attribute-Based Encryption Scheme Supporting Attribute Revocation [PDF]

open access: yesJisuanji gongcheng, 2017
Traditional Ciphertext-Policy Attribute-Based Encryption(CP-ABE) schemes have large computational overhead in key generation,decryption and attribute revocation processes.Aiming at this problem,this paper proposes an outsourced CP-ABE scheme which ...
LIU Zhusong,PENG Jiapeng
doaj   +1 more source

Efficient Attribute-Based Encryption Outsourcing Scheme With User and Attribute Revocation for Fog-Enabled IoT

open access: yesIEEE Access, 2020
With the rapid growth of Internet of Things (IoT) applications, fog computing enables the IoT to provide efficient services by extending the cloud computing paradigm to the edge of the network.
Ling Li, Zheng Wang, Na Li
doaj   +1 more source

PSEUDONYMITY SYSTEM ADMINISTRATOR GUIDE [PDF]

open access: yes, 2013
EMI Pseudonymity System provides users with a way to hide their true identity behind a pseudonymous ...
White, John
core   +1 more source

Revocable Ciphertext-Policy Attribute-Based Encryption in Data Outsourcing Systems from Lattices

open access: yesJisuanji kexue yu tansuo, 2020
Attribute-based encryption mechanism is widely used in outsourcing environment because of its charac-teristics of “one-to-many” communication. However, users attributes often change dynamically.
YU Jinxia, YANG Chaochao, ZHANG Qichao, YAN Xixi
doaj   +1 more source

Efficient and Expressive Access Control With Revocation for Privacy of PHR Based on OBDD Access Structure

open access: yesIEEE Access, 2020
With the advancement of information and communication technology (ICT), the medical sector is undergoing a massive transformation. Health records are being digitized, stored remotely in the cloud and shared with different stakeholders.
Kennedy Edemacu   +2 more
doaj   +1 more source

CP-ABE Scheme with Attribute Revocation Under Environment of Multi-attribute Authority [PDF]

open access: yesJisuanji gongcheng, 2018
For the attribute-based encryption scheme,a single authority has the problem of low efficiency and easy disclosure of user keys.Through the establishment of a decentralized attribute authority and agent reencryption technology,a Ciphertext-policy ...
ZHANG Yulei,LIU Wenjing,MA Yanli,WANG Caifen
doaj   +1 more source

Data Minimisation in Communication Protocols: A Formal Analysis Framework and Application to Identity Management [PDF]

open access: yes, 2014
With the growing amount of personal information exchanged over the Internet, privacy is becoming more and more a concern for users. One of the key principles in protecting privacy is data minimisation. This principle requires that only the minimum amount
de Weger, Benne   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy