Results 131 to 140 of about 753 (173)
Some of the next articles are maybe not open access.

Recipient Anonymous Ciphertext-Policy Attribute Based Encryption

2013
Attribute Based Encryption ABE is a promising and increasingly versatile paradigm. Given the many potential uses of ABE schemes, constructing efficient schemes that provide recipient anonymity via policy hiding while ensuring constant-size secret key and ciphertext with strong security notion is a challenging task.
Y. Sreenivasa Rao, Ratna Dutta
openaire   +1 more source

Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption

2017 IEEE International Conference on Smart Computing (SMARTCOMP), 2017
We propose a technique of individually modifying an attribute-based encryption scheme (ABE) secure against chosen-plaintext attacks (CPA) into an ABE scheme secure against chosen- ciphertext attacks (CCA) in the standard model. We demonstrate the technique in the case of the Waters ciphertext-policy ABE (CP-ABE).
Hiroaki Anada, Seiko Arita
openaire   +1 more source

Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application

2009
In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), a user secret key is associated with a set of attributes, and the ciphertext is associated with an access policy over attributes. The user can decrypt the ciphertext if and only if the attribute set of his secret key satisfies the access policy specified in the ciphertext. Several CP-ABE schemes
Ibraimi, L.   +4 more
openaire   +2 more sources

GPU Acceleration of Ciphertext-Policy Attribute-Based Encryption

2019 20th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2019
With the development of cloud computing, data security became popular in recent decades. However, traditional cryptography has some major limitations. For example, public key cryptography is not scalable in cases with many clients. Since Ciphertext-Policy Attribute-based encryption (CP-ABE) was developed in 2007, it has become as one of the major ...
Kai Fan   +4 more
openaire   +1 more source

Privacy Preserving Ciphertext Policy Attribute Based Encryption

2010
Ciphertext policy attribute based encryption (CP-ABE) allows to encrypt data under an access policy. The access policy can be formed with the logical combination of attributes.. Such ciphertexts can be decrypted by anyone with a set of attributes that satisfy the access policy. In CP-ABE, access policy is sent along with the ciphertext.
A. Balu, K. Kuppusamy
openaire   +1 more source

Securely outsourcing the ciphertext-policy attribute-based encryption

World Wide Web, 2017
Attribute-based Encryption (ABE) is a new and promising public key encryption that allows fine-grained authorization on data based on user attributes. Such property is favorable for multiple applications that require encrypted storage or access control on data, in particular: eHealth applications.
Nguyen, Kim Thuat   +2 more
openaire   +1 more source

An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption

Information Sciences, 2014
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Balu, A., Kuppusamy, K.
openaire   +2 more sources

Ciphertext-Policy Attribute-Based Delay Encryption

International Journal of Information and Computer Security, 2022
Lijiao Chen, Kewei Lv
openaire   +1 more source

An Improved Ciphertext-Policy Attribute-Based Encryption Scheme

2017
According to characteristics of mass encryption service in cloud storage, this paper proposed an improved SCP-OOABE scheme which uses the access control tree as a control structure and decomposes key generation and encryption into online and offline phase respectively that could be finished in a short time in online phase.
Hua Zheng, Xi Zhang, Qi Yang
openaire   +1 more source

Enhanced Ciphertext-Policy Attribute-Based Encryption (ECP-ABE)

2019
Cloud computing becomes an open environment which provides an opportunity for integrating additional capacity, or new features, into existing systems on dynamic provisioning of computing resources with minimal management costs in an optimal way. Initially, public keys are replaced with arbitrary strings which act as an identity in Identity Based ...
J. Venkata Rao   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy