Results 141 to 150 of about 5,325 (187)
A robust algorithm for authenticated health data access via blockchain and cloud computing. [PDF]
Shahzad A +4 more
europepmc +1 more source
Attribute encryption access control method of high dimensional medical data based on fuzzy algorithm. [PDF]
Huang Y, Teng T, Li Y, Zhang M.
europepmc +1 more source
Quantum resilient security framework for privacy preserving AI in Apple MM1 on device architecture. [PDF]
Umer N +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption
Information Sciences, 2014zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Balu, A., Kuppusamy, K.
openaire +4 more sources
Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption
IEEE Transactions on Computers, 2015Zhibin Zhou, Dijiang Huang, Zhijie Wang
openaire +3 more sources
Ciphertext policy-hiding attribute-based encryption
2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015Ciphertext-policy attribute based encryption (CP-ABE) is becoming very important in distributed computing environment, because it makes easier to protect, broadcast and control the access of information, especially over the cloud server. In CP-ABE every plaintext is encrypted under an access structure, defined on the user's attribute and users have ...
Umesh Chandra Yadav, Syed Taqi Ali
openaire +1 more source
Server Aided Ciphertext-Policy Attribute-Based Encryption
2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, 2015Attribute-based encryption (ABE) is a type of public key encryption that allows users to encrypt and decrypt messages based on user attributes. One drawback is that encryption and decryption computational costs scale with the complexity of the access policy or number of attributes. In practice, this makes encryption and decryption a possible bottleneck
Hao Wang, Bo Yang, Yilei Wang
openaire +1 more source
Ciphertext policy attribute-based encryption from lattices
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, 2012Sahai and Waters [6] proposed Attribute-Based Encryption (ABE) as a new paradigm of encryption algorithms that allow the sender to set a policy describing who can decrypt a particular ciphertext. In this paper, we first propose a ciphertext policy attribute-based encryption (CP-ABE) scheme from lattices, which supports flexible threshold access ...
Jiang Zhang, Zhenfeng Zhang, Aijun Ge
openaire +1 more source
Bounded Ciphertext Policy Attribute Based Encryption
2008In a ciphertext policy attribute based encryption system, a user's private key is associated with a set of attributes (describing the user) and an encrypted ciphertext will specify an access policy over attributes. A user will be able to decrypt if and only if his attributes satisfy the ciphertext's policy.
Vipul Goyal +3 more
openaire +1 more source

