Results 1 to 10 of about 714 (135)

Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption [PDF]

open access: yesSensors, 2019
Recently, using advanced cryptographic techniques to process, store, and share data securely in an untrusted cloud environment has drawn widespread attention from academic researchers.
Ruqayah R. Al-Dahhan   +3 more
doaj   +5 more sources

Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption [PDF]

open access: yesJournal of Universal Computer Science, 2019
Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data provider encrypts a secret message and then sends the ciphertext to the receivers according to the access policy which she/he decides.
Yi-Fan Tseng, Chun-I Fan, Chih-Wen Lin
doaj   +4 more sources

Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme [PDF]

open access: yesInformation, 2015
In the existing attribute-based encryption (ABE) scheme, the authority (i.e., private key generator (PKG)) is able to calculate and issue any user’s private key, which makes it completely trusted, which severely influences the applications of the ABE ...
Xingbing Fu, Xuyun Nie, Fagen Li
doaj   +2 more sources

Forward-secure ciphertext-policy attribute-based encryption scheme

open access: yesTongxin xuebao, 2014
To mitigate the damage of key exposure in the context of ciphertext-policy attribute-based encryption (CP-ABE). The syntax and security model of forward-secure CP-ABE was presented. Then, a concreted forward-secure CP-ABE scheme was constructed.
EIJiang-hong W, IUWen-fen L, UXue-xian H
doaj   +3 more sources

Lazy-mode Ciphertext-update Based Approach for CP-ABE Attribute Change [PDF]

open access: yesJisuanji kexue, 2022
Ciphertext-policy attribute-based encryption(CP-ABE) can be used to realize secure data sharing in cloud computing environments.However,user attribute change(attribute revocation and addition) in CP-ABE is a tricky problem.Generally,attribute change is ...
LEI Xue-jiao, WANG Yin-long, Nurmamat HELIL
doaj   +1 more source

Fine Grained and Efficient Searchable Encryption Scheme Based on Attribute Policy Hiding inCloud Environment [PDF]

open access: yesJisuanji kexue, 2023
Attribute based encryption provides flexible and fine-grained access control for outsourced data stored in the cloud.The traditional attribute based ciphertext policy encryption scheme(CP-ABE),whose access policy often appears in the form of plaintext,is
ZHOU Yihua, LI Meiqi, HU Xinyu, YANG Yuguang
doaj   +1 more source

Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing

open access: yes网络与信息安全学报, 2022
Proxy re-encryption allows a proxy to convert a ciphertext related to a certain access policy into another one with a different access policy without uncovering the underlying plaintext, which makes the proxy re-encryption technology to be an important ...
Shang LIU, Yinzhang GUO
doaj   +3 more sources

Ciphertext policy attribute-based encryption scheme supporting direct revocation

open access: yesTongxin xuebao, 2016
In order to support fine-grained attribute revocation in direct revocation mode an attribute-based encryption scheme with efficient revocation was proposed.The model of ABE supporting attribute revocation was given,and a con-crete scheme was constructed ...
Xi-xi YAN, Hui MENG
doaj   +3 more sources

Ciphertext-Policy Attribute-Based Encryption [PDF]

open access: yes2007 IEEE Symposium on Security and Privacy (SP '07), 2007
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or attributes. Currently, the only method for enforcing such policies is to employ a trusted server to store the data and mediate access control.
John Bethencourt   +2 more
openaire   +1 more source

Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage. [PDF]

open access: yesPLoS ONE, 2018
With the development of outsourcing data services, data security has become an urgent problem that needs to be solved. Attribute-based encryption is a valid solution to data security in cloud storage.
Shangping Wang   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy