Results 31 to 40 of about 18,941 (248)

Multi-Keyword Searchable Encryption Scheme Supporting Attribute Revocation in Cloud Storage [PDF]

open access: yesJisuanji gongcheng, 2021
The convenience and efficiency of cloud storage make more and more users choose to store data in cloud.In order to support users to retrieve encrypted data in cloud,a multi keyword search scheme based on attribute encryption supporting attribute ...
HUANG Baohua, HUANG Pirong, ZHAO Weihong, PENG Li
doaj   +1 more source

UVOS CLIENT MANUAL [PDF]

open access: yes, 2013
UVOS CLIENT ...
Schuller, Bernd
core   +1 more source

Ciphertext policy attribute-based encryption scheme supporting direct revocation

open access: yesTongxin xuebao, 2016
In order to support fine-grained attribute revocation in direct revocation mode an attribute-based encryption scheme with efficient revocation was proposed.The model of ABE supporting attribute revocation was given,and a con-crete scheme was constructed ...
Xi-xi YAN, Hui MENG
doaj   +2 more sources

Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage

open access: yesIEEE Access, 2020
With the rapid growth of the cloud computing and strengthening of security requirements, encrypted cloud services are of importance and benefit. For the huge ciphertext data stored in the cloud, many secure searchable methods based on cryptography with ...
Leyou Zhang, Jian Su, Yi Mu
doaj   +1 more source

Multi-Keywords Searchable Attribute-Based Encryption With Verification and Attribute Revocation Over Cloud Data

open access: yesIEEE Access, 2023
The convenience and efficient management of cloud servers have resulted in an increasing number of users opting to store their data in the cloud. Consequently, data-outsourcing services relying on cloud servers have been extensively deployed and utilized.
Hua Shen, Jian Zhou, Ge Wu, Mingwu Zhang
doaj   +1 more source

Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation

open access: yes, 2018
Efficient user revocation is a necessary but challenging problem in many multi-user cryptosystems. Among known approaches, server-aided revocation yields a promising solution, because it allows to outsource the major workloads of system users to a ...
Ling, San   +3 more
core   +1 more source

Authorization algorithms for permission-role assignments [PDF]

open access: yes, 2009
Permission-role assignments (PRA) is one important process in Role-based access control (RBAC) which has been proven to be a flexible and useful access model for information sharing in distributed collaborative environments.
Sun, Lili, Wang, Hua, Yong, Jianming
core   +2 more sources

Attribute-Based Encryption with Granular Revocation

open access: yes, 2017
Attribute-based encryption (ABE) enables an access control mechanism over encrypted data by specifying access policies over attributes associated with private keys or ciphertexts, which is a promising solution to protect data privacy in cloud storage services. As an encryption system that involves many data users whose attributes might change over time,
Cui, H., Deng, R.H., Ding, X., Li, Y.
openaire   +3 more sources

Attribute-based encryption scheme with efficient revocation in data outsourcing systems

open access: yesTongxin xuebao, 2015
In order to support fine-grained attribute revocation in data outsourcing systems,an attribute-based encryption scheme with efficient revocation in indirect revocation model was proposed.The model of ABE supporting attribute revocation was given,and a ...
Xi-xi YAN, Yong-li TANG
doaj   +2 more sources

Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage. [PDF]

open access: yesPLoS ONE, 2018
In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user may have multiple attributes, and each attribute may be shared simultaneously by many users. The decryption key of an attribute can thus be shared by many users who all possess the
Shangping Wang, Keke Guo, Yaling Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy