mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography
We address the problem of user fast revocation in the lattice-based Ciphertext Policy Attribute-Based Encryption (CP-ABE) by extending the scheme originally introduced by Zhang and Zhang [Zhang J, Zhang Z.
Cianfriglia Marco +2 more
doaj +1 more source
TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT
The convergence of software-defined networking (SDN) and the Internet of Things (IoT) provides a scalable method for handling the considerable volumes of data produced by IoT devices.
Jiamin Hu +6 more
doaj +1 more source
Ciphertext Policy Attribute Based Encryption with Intel SGX
Modern computing environments demand robust security measures to protect sensitive data and resources. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a well-established encryption technique known for its fine-grained access control capabilities.
Suryawanshi, Vivek, Sural, Shamik
openaire +2 more sources
Multi-authority attribute-based encryption with efficient revocation
Multi-authority attribute-based encryption was very suitable for data access control in a cloud storage environment.However,efficient user revocation in multi-authority attribute-based encryption remains a challenging problem that prevents it from ...
Kai ZHANG +4 more
doaj +2 more sources
Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage. [PDF]
Wang S, Guo K, Zhang Y.
europepmc +1 more source
Correction: Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage. [PDF]
PLOS ONE Staff.
europepmc +1 more source
ELiPS-based Ciphertext-Policy Attribute-Based Encryption
Le Hoang Anh +5 more
openaire +2 more sources
An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things. [PDF]
Guo C +5 more
europepmc +1 more source
Distributed Identity Authentication with Lenstra-Lenstra-Lovász Algorithm-Ciphertext Policy Attribute-Based Encryption from Lattices: An Efficient Approach Based on Ring Learning with Errors Problem. [PDF]
Yuan Q +6 more
europepmc +1 more source
Revocable and Traceable Decentralized ABE for P2P Networks. [PDF]
Gao D, Xu H, Qian S.
europepmc +1 more source

