Results 231 to 240 of about 18,941 (248)
Some of the next articles are maybe not open access.
2015 Third International Symposium on Computing and Networking (CANDAR), 2015
Disruption-tolerant network technologies are becoming solutions to access the confidential information or command by exploiting external storage node. It is necessary to encrypt the shared data to prevent illegal access to ciphertext by the third party.
Kenta Nomura +3 more
openaire +1 more source
Disruption-tolerant network technologies are becoming solutions to access the confidential information or command by exploiting external storage node. It is necessary to encrypt the shared data to prevent illegal access to ciphertext by the third party.
Kenta Nomura +3 more
openaire +1 more source
Efficient Attribute Revocation Scheme for Multi-authority Attribute Cloud Storage System
2016 International Conference on Information Technology (ICIT), 2016Cloud computing is an emerging computing tool in which resources accessed as a service over Internet on pay for use basis. Most of the organization are changing their storage server to cloud server without any botheration. It is a great challenge for the cloud service provider to attract the customers to store their sensitive data/file in the cloud ...
Kasturi Dhal +2 more
openaire +1 more source
A Revocable Outsourcing Attribute-Based Encryption Scheme
2017Attribute-Based Encryption (ABE) is a generalized cryptographic primitive from normal public key encryption. It provides an access control mechanism over encrypted message using access policies and ascribed attributes. This scheme can solve the privacy issue when data is outsourced to cloud for storage well.
Zoe L. Jiang +6 more
openaire +1 more source
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List
2018In this paper, we propose an efficient revocable Ciphertext-Policy Attribute-Based Encryption (CP-ABE) scheme. We base on the direct revocation approach, by embedding the revocation list into ciphertext. However, since the revocation list will grow longer as time goes by, we further leverage this by proposing a secret key time validation technique so ...
Joseph K. Liu +3 more
openaire +1 more source
A Policy Revocation Scheme for Attributes-based Encryption
Proceedings of the 10th International Conference on Advances in Information Technology, 2018Attributes-based encryption (ABE) is a promising cryptographic mechanism that provides a fine-grained access control for cloud environment. Since most of the parties exchange sensitive data among them by using cloud computing, data protection is very important for data confidentiality.
Phyo Wah Wah Myint +2 more
openaire +1 more source
Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes
2009Attribute-based encryption (ABE) enables an access control mechanism over encrypted data by specifying access policies among private keys and ciphertexts. In this paper, we focus on ABE that supports revocation. Currently, there are two available revocable ABE schemes in the literature.
Nuttapong Attrapadung, Hideki Imai
openaire +1 more source
Revocable attribute-based encryption from standard lattices
Computer Standards & Interfaces, 2023Fucai Luo +4 more
openaire +1 more source
Attribute-based encryption scheme with attribute revocation
WIT Transactions on Engineering Sciences, 2015Y.J. He, L. You, K. Lian
openaire +1 more source
Practical Attribute-based Signature: Traceability and Revocability
The Computer Journal, 2016Jianghong Wei +3 more
openaire +1 more source
Decentralized Attribute-Based Access Control with Attribute Revocation and Outsourced Decryption
2023 15th International Conference on Computer Research and Development (ICCRD), 2023Feng Yang, Hui Cui, Jiwu Jing
openaire +1 more source

