Results 211 to 220 of about 18,941 (248)
Scalable privacy-preserving data analytics for IoMT via FHE and zk-SNARK-enabled edge aggregation. [PDF]
Ben Othman S, Mihret N.
europepmc +1 more source
Studying Parole Revocation Practices: Accounting for Dependency Between Competing Events. [PDF]
Rhodes W, Gaes G, Sabol W.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Attribute based data sharing with attribute revocation
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, 2010Ciphertext-Policy Attribute Based Encryption (CP-ABE) is a promising cryptographic primitive for fine-grained access control of shared data. In CP-ABE, each user is associated with a set of attributes and data are encrypted with access structures on attributes.
Shucheng Yu +3 more
openaire +1 more source
Attributes revocation through ciphertext puncturation
Journal of Information Security and Applications, 2019Abstract In order to solve the difficult issue of attribute revocation in the attribute based encryption scheme, a novel method of revoking attributes through ciphertext puncturation is proposed. In this method, a ciphertext puncturation algorithm is designed and the “NOT” operator’s ability to negate attributes in the non-monotonic access policy is ...
Hongyong Jia +6 more
openaire +1 more source
Multi-authority Attribute Based Encryption with Attribute Revocation
2014 IEEE 17th International Conference on Computational Science and Engineering, 2014Multi authority attribute based encryption solve a completely trust problem about a single authorization center, make the data owner control fine-grained data and resist collusion attack. But in the practical attribute revocation needs a lot of calculation. Adding the user revocation list into cipher text implements the user revocation.
Liu Zhenpeng +2 more
openaire +1 more source
An Attribute Revocable CP-ABE Scheme
2019 Seventh International Conference on Advanced Cloud and Big Data (CBD), 2019Ciphertext storage can effectively solve the security problems in cloud storage, among which the ciphertext policy attribute-based encryption (CP-ABE) is more suitable for ciphertext access control in cloud storage environment for it can achieve one-to-many ciphertext sharing. The existing attribute encryption scheme CP-ABE has problems with revocation
Guangli Xiang +4 more
openaire +1 more source
Attribute-Based Signatures with Efficient Revocation
2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013Based signatures (ABS for short) allow an entity to sign messages with a fine-grained control over identity information. The signature attests not to the identity of the individual who endorsed a message, but instead to a claim regarding the attributes he/she holds.
Yanling Lian, Li Xu, Xinyi Huang
openaire +1 more source
Fully secure revocable attribute-based encryption
Journal of Shanghai Jiaotong University (Science), 2011zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Qian, Jun-lei, Dong, Xiao-lei
openaire +1 more source
Immediate Attribute Revocation in Decentralized Attribute-Based Encryption Access Control
2017 IEEE Trustcom/BigDataSE/ICESS, 2017Access control is one of the most challenging issues in Cloud environment, it must ensure data confidentiality through enforced and flexible access policies. The revocation is an important task of the access control process, generally it consists on banishing some roles from the users.
Youcef Imine +2 more
openaire +1 more source

