Results 21 to 30 of about 753 (173)

Enhancing Secure Communication in the Cloud Through Blockchain Assisted-CP-DABE

open access: yesIEEE Access, 2023
The use of encryption is essential to protect sensitive data, but it often poses challenges when it comes to locating and retrieving information without decryption.
G. Sucharitha   +4 more
doaj   +1 more source

An Outsourced Attribute-Based Encryption Scheme Supporting Attribute Revocation [PDF]

open access: yesJisuanji gongcheng, 2017
Traditional Ciphertext-Policy Attribute-Based Encryption(CP-ABE) schemes have large computational overhead in key generation,decryption and attribute revocation processes.Aiming at this problem,this paper proposes an outsourced CP-ABE scheme which ...
LIU Zhusong,PENG Jiapeng
doaj   +1 more source

DSVN: A Flexible and Secure Data-Sharing Model for VANET Based on Blockchain

open access: yesApplied Sciences, 2022
Vehicular Ad Hoc Network (VANET) is an important part of the modern intelligent transportation system, which can provide vehicle communication at a certain distance. More importantly, VANET can provide route planning and autonomous driving for drivers by
Xiaoxuan Chen   +4 more
doaj   +1 more source

Adaptable Ciphertext-Policy Attribute-Based Encryption

open access: yes, 2014
In this paper, we introduce a new cryptographic primitive, called adaptable ciphertext-policy attribute-based encryption CP-ABE. Adaptable CP-ABE extends the traditional CP-ABE by allowing a semi-trusted proxy to modify a ciphertext under one access policy into ciphertexts of the same plaintext under any other access policies; the proxy, however ...
LAI, Junzuo   +3 more
openaire   +3 more sources

Proposal for Quantum Ciphertext-Policy Attribute-Based Encryption

open access: yes, 2022
12 ...
Samanta, Asmita   +2 more
openaire   +2 more sources

An Attribute-based Encryption Scheme for Ciphertext Policy that Supports Attribute Revocation [PDF]

open access: yesJisuanji gongcheng, 2021
The traditional single-authorization Attribute-Based Encryption(ABE) schemes are limited by the high computing overhead and the poor security.Based on secure two-party computing protocols,this paper proposes a multi-authorization ciphertext policy ABE ...
WANG Jingyu, ZHOU Xuejuan
doaj   +1 more source

Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test

open access: yesIEEE Access, 2018
Attribute-based encryption is a popular cryptographic technology to protect the privacy of clients' data in cloud computing. In order to make the scheme have the functionality of comparing ciphertext, Zhu et al. combined concepts of key-policy attributed-
Yongjian Liao   +5 more
doaj   +1 more source

ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION [PDF]

open access: yesBulletin of the Korean Mathematical Society, 2009
In classical encryption schemes, data is encrypted under a single key that is associated with a user or group. In Ciphertext-Policy Attribute-Based Encryption(CP-ABE) keys are associated with attributes of users, given to them by a central trusted authority, and data is en- crypted under a logical formula over these attributes.
Sascha Muller   +2 more
openaire   +1 more source

An Enhanced Approach for CP-ABE with Proxy Re-encryption in IoT Paradigm

open access: yesJordanian Journal of Computers and Information Technology, 2022
In Internet of Things (IoT), encryption is a technique in which plaintext is converted to ciphertext to make it non-recovered by the attacker without secret key.
Nishant Doshi
doaj   +1 more source

Ciphertext policy Attribute based Encryption with anonymous access policy

open access: yesInternational Journal of Peer to Peer Networks, 2010
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt the encrypted message. The policy can be formed with the help of attributes. In CP-ABE, access policy is sent along with the ciphertext. We propose a method in which the access policy need not be sent along with the ciphertext, by which we are able
Balu, A., Kuppusamy, K.
openaire   +2 more sources

Home - About - Disclaimer - Privacy