Results 131 to 140 of about 753 (173)
Some of the next articles are maybe not open access.
Recipient Anonymous Ciphertext-Policy Attribute Based Encryption
2013Attribute Based Encryption ABE is a promising and increasingly versatile paradigm. Given the many potential uses of ABE schemes, constructing efficient schemes that provide recipient anonymity via policy hiding while ensuring constant-size secret key and ciphertext with strong security notion is a challenging task.
Y. Sreenivasa Rao, Ratna Dutta
openaire +1 more source
Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption
2017 IEEE International Conference on Smart Computing (SMARTCOMP), 2017We propose a technique of individually modifying an attribute-based encryption scheme (ABE) secure against chosen-plaintext attacks (CPA) into an ABE scheme secure against chosen- ciphertext attacks (CCA) in the standard model. We demonstrate the technique in the case of the Waters ciphertext-policy ABE (CP-ABE).
Hiroaki Anada, Seiko Arita
openaire +1 more source
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application
2009In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), a user secret key is associated with a set of attributes, and the ciphertext is associated with an access policy over attributes. The user can decrypt the ciphertext if and only if the attribute set of his secret key satisfies the access policy specified in the ciphertext. Several CP-ABE schemes
Ibraimi, L. +4 more
openaire +2 more sources
GPU Acceleration of Ciphertext-Policy Attribute-Based Encryption
2019 20th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), 2019With the development of cloud computing, data security became popular in recent decades. However, traditional cryptography has some major limitations. For example, public key cryptography is not scalable in cases with many clients. Since Ciphertext-Policy Attribute-based encryption (CP-ABE) was developed in 2007, it has become as one of the major ...
Kai Fan +4 more
openaire +1 more source
Privacy Preserving Ciphertext Policy Attribute Based Encryption
2010Ciphertext policy attribute based encryption (CP-ABE) allows to encrypt data under an access policy. The access policy can be formed with the logical combination of attributes.. Such ciphertexts can be decrypted by anyone with a set of attributes that satisfy the access policy. In CP-ABE, access policy is sent along with the ciphertext.
A. Balu, K. Kuppusamy
openaire +1 more source
Securely outsourcing the ciphertext-policy attribute-based encryption
World Wide Web, 2017Attribute-based Encryption (ABE) is a new and promising public key encryption that allows fine-grained authorization on data based on user attributes. Such property is favorable for multiple applications that require encrypted storage or access control on data, in particular: eHealth applications.
Nguyen, Kim Thuat +2 more
openaire +1 more source
An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption
Information Sciences, 2014zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Balu, A., Kuppusamy, K.
openaire +2 more sources
Ciphertext-Policy Attribute-Based Delay Encryption
International Journal of Information and Computer Security, 2022Lijiao Chen, Kewei Lv
openaire +1 more source
An Improved Ciphertext-Policy Attribute-Based Encryption Scheme
2017According to characteristics of mass encryption service in cloud storage, this paper proposed an improved SCP-OOABE scheme which uses the access control tree as a control structure and decomposes key generation and encryption into online and offline phase respectively that could be finished in a short time in online phase.
Hua Zheng, Xi Zhang, Qi Yang
openaire +1 more source
Enhanced Ciphertext-Policy Attribute-Based Encryption (ECP-ABE)
2019Cloud computing becomes an open environment which provides an opportunity for integrating additional capacity, or new features, into existing systems on dynamic provisioning of computing resources with minimal management costs in an optimal way. Initially, public keys are replaced with arbitrary strings which act as an identity in Identity Based ...
J. Venkata Rao +2 more
openaire +1 more source

