Results 41 to 50 of about 18,941 (248)
On the feasibility of attribute-based encryption on Internet of Things devices [PDF]
Attribute-based encryption (ABE) could be an effective cryptographic tool for the secure management of Internet of Things (IoT) devices, but its feasibility in the IoT has been under-investigated thus far.
AMbrosin, M +6 more
core +3 more sources
Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption
As an advanced one-to-many public key encryption system, attribute-based encryption (ABE) is widely believed to be a promising technology for achieving flexible and fine-grained access control of encrypted data on untrusted storage servers (e.g., public cloud servers). However, user revocation in ABE is a critical but challenging problem, and designing
LI, Xiaoguo +6 more
openaire +2 more sources
Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems
Attribute-based encryption, especially for ciphertext-policy attribute-based encryption, can fulfill the functionality of fine-grained access control in cloud storage systems. Since users' attributes may be issued by multiple attribute authorities, multi-
Xiaoyu Li +4 more
doaj +1 more source
Secure Personal Content Networking over Untrusted Devices
Securely sharing and managing personal content is a challenging task in multi-device environments. In this paper, we design and implement a new platform called Personal Content Networking (PCN).
Joy, Joshua, Lee, Uichin, Noh, Youngtae
core +1 more source
Server-Aided Revocable Attribute-Based Encryption
As a one-to-many public key encryption system, attribute-based encryption (ABE) enables scalable access control over encrypted data in cloud storage services. However, efficient user revocation has been a very challenging problem in ABE. To address this issue, Boldyreva, Goyal and Kumar [5] introduced a revocation method by combining the binary tree ...
Cui, H., Deng, R.H., Li, Y., Qin, B.
openaire +3 more sources
We have developed a Pd‐catalyzed oxidative cyclopropanation of 1,n‐enynes employing cyclic diacyl peroxides as bifunctional reagents that serve as both tether‐tunable oxidants and spatially controlled dicarboxylate anions. ABSTRACT Bicyclo[n.1.0]alkanes are highly valuable scaffolds in drug discovery and synthetic chemistry.
Ting Yuan, Lei Shi
wiley +1 more source
Competition Policy and Agribusiness in the Biden Administration
ABSTRACT The Biden Administration pursued a set of ambitious competition policy initiatives in agriculture and agribusiness, primarily aimed at livestock and poultry supply chains, farm inputs, and food retailing. The initiatives included expanded antitrust enforcement; new US Department of Agriculture (USDA) contract regulations requiring poultry ...
James M. MacDonald
wiley +1 more source
Server-Aided Revocable Attribute-Based Encryption from Lattices [PDF]
Attribute-based encryption (ABE) can support a fine-grained access control to encrypted data. When the user’s secret-key is compromised, the ABE system has to revoke its decryption privileges to prevent the leakage of encrypted data. Although there are many constructions about revocable ABE from bilinear maps, the situation with lattice-based ...
Xingting Dong +3 more
openaire +1 more source
Attribute-based encryption can be used to realize fine-grained data sharing in open networks. However, in practical applications, we have to address further challenging issues, such as attribute revocation and data search.
Axin Wu +3 more
doaj +1 more source

