Results 21 to 30 of about 5,325 (187)

Revocable Ciphertext-Policy Attribute-Based Encryption in Data Outsourcing Systems from Lattices

open access: yesJisuanji kexue yu tansuo, 2020
Attribute-based encryption mechanism is widely used in outsourcing environment because of its charac-teristics of “one-to-many” communication. However, users attributes often change dynamically.
YU Jinxia, YANG Chaochao, ZHANG Qichao, YAN Xixi
doaj   +1 more source

On the feasibility of attribute-based encryption on Internet of Things devices [PDF]

open access: yes, 2016
Attribute-based encryption (ABE) could be an effective cryptographic tool for the secure management of Internet of Things (IoT) devices, but its feasibility in the IoT has been under-investigated thus far.
AMbrosin, M   +6 more
core   +3 more sources

Efficient Privacy-Preserving Access Control of Mobile Multimedia Data in Cloud Computing

open access: yesIEEE Access, 2019
With the nature of allowing the encryptor to define the access policy before encrypting a message, Ciphertext-policy attribute-based encryption (CP-ABE) has been widely adopted as a primitive to design cloud-assisted mobile multimedia data sharing system.
Qi Li   +4 more
doaj   +1 more source

Search Me If You Can: Privacy-preserving Location Query Service [PDF]

open access: yes, 2013
Location-Based Service (LBS) becomes increasingly popular with the dramatic growth of smartphones and social network services (SNS), and its context-rich functionalities attract considerable users.
Jung, Taeho, Li, Xiang-Yang
core   +2 more sources

Unified Ciphertext-Policy Weighted Attribute-Based Encryption for Sharing Data in Cloud Computing

open access: yesApplied Sciences, 2018
With the rapid development of cloud computing, it is playing an increasingly important role in data sharing. Meanwhile, attribute-based encryption (ABE) has been an effective way to share data securely in cloud computing.
Wei Li   +4 more
doaj   +1 more source

Enhancing Secure Communication in the Cloud Through Blockchain Assisted-CP-DABE

open access: yesIEEE Access, 2023
The use of encryption is essential to protect sensitive data, but it often poses challenges when it comes to locating and retrieving information without decryption.
G. Sucharitha   +4 more
doaj   +1 more source

An Outsourced Attribute-Based Encryption Scheme Supporting Attribute Revocation [PDF]

open access: yesJisuanji gongcheng, 2017
Traditional Ciphertext-Policy Attribute-Based Encryption(CP-ABE) schemes have large computational overhead in key generation,decryption and attribute revocation processes.Aiming at this problem,this paper proposes an outsourced CP-ABE scheme which ...
LIU Zhusong,PENG Jiapeng
doaj   +1 more source

Forward-secure hierarchical predicate encryption [PDF]

open access: yes, 2012
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz
Gonzalez Nieto, Juan   +2 more
core   +2 more sources

DSVN: A Flexible and Secure Data-Sharing Model for VANET Based on Blockchain

open access: yesApplied Sciences, 2022
Vehicular Ad Hoc Network (VANET) is an important part of the modern intelligent transportation system, which can provide vehicle communication at a certain distance. More importantly, VANET can provide route planning and autonomous driving for drivers by
Xiaoxuan Chen   +4 more
doaj   +1 more source

Longitude : a privacy-preserving location sharing protocol for mobile applications [PDF]

open access: yes, 2011
Location sharing services are becoming increasingly popular. Although many location sharing services allow users to set up privacy policies to control who can access their location, the use made by service providers remains a source of concern.
A. Beresford   +14 more
core   +3 more sources

Home - About - Disclaimer - Privacy