Results 31 to 40 of about 18,941 (248)
Multi-Keyword Searchable Encryption Scheme Supporting Attribute Revocation in Cloud Storage [PDF]
The convenience and efficiency of cloud storage make more and more users choose to store data in cloud.In order to support users to retrieve encrypted data in cloud,a multi keyword search scheme based on attribute encryption supporting attribute ...
HUANG Baohua, HUANG Pirong, ZHAO Weihong, PENG Li
doaj +1 more source
Ciphertext policy attribute-based encryption scheme supporting direct revocation
In order to support fine-grained attribute revocation in direct revocation mode an attribute-based encryption scheme with efficient revocation was proposed.The model of ABE supporting attribute revocation was given,and a con-crete scheme was constructed ...
Xi-xi YAN, Hui MENG
doaj +2 more sources
Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage
With the rapid growth of the cloud computing and strengthening of security requirements, encrypted cloud services are of importance and benefit. For the huge ciphertext data stored in the cloud, many secure searchable methods based on cryptography with ...
Leyou Zhang, Jian Su, Yi Mu
doaj +1 more source
The convenience and efficient management of cloud servers have resulted in an increasing number of users opting to store their data in the cloud. Consequently, data-outsourcing services relying on cloud servers have been extensively deployed and utilized.
Hua Shen, Jian Zhou, Ge Wu, Mingwu Zhang
doaj +1 more source
Server-Aided Revocable Predicate Encryption: Formalization and Lattice-Based Instantiation
Efficient user revocation is a necessary but challenging problem in many multi-user cryptosystems. Among known approaches, server-aided revocation yields a promising solution, because it allows to outsource the major workloads of system users to a ...
Ling, San +3 more
core +1 more source
Authorization algorithms for permission-role assignments [PDF]
Permission-role assignments (PRA) is one important process in Role-based access control (RBAC) which has been proven to be a flexible and useful access model for information sharing in distributed collaborative environments.
Sun, Lili, Wang, Hua, Yong, Jianming
core +2 more sources
Attribute-Based Encryption with Granular Revocation
Attribute-based encryption (ABE) enables an access control mechanism over encrypted data by specifying access policies over attributes associated with private keys or ciphertexts, which is a promising solution to protect data privacy in cloud storage services. As an encryption system that involves many data users whose attributes might change over time,
Cui, H., Deng, R.H., Ding, X., Li, Y.
openaire +3 more sources
Attribute-based encryption scheme with efficient revocation in data outsourcing systems
In order to support fine-grained attribute revocation in data outsourcing systems,an attribute-based encryption scheme with efficient revocation in indirect revocation model was proposed.The model of ABE supporting attribute revocation was given,and a ...
Xi-xi YAN, Yong-li TANG
doaj +2 more sources
Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage. [PDF]
In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user may have multiple attributes, and each attribute may be shared simultaneously by many users. The decryption key of an attribute can thus be shared by many users who all possess the
Shangping Wang, Keke Guo, Yaling Zhang
doaj +1 more source

