Revocable Ciphertext-Policy Attribute-Based Encryption in Data Outsourcing Systems from Lattices
Attribute-based encryption mechanism is widely used in outsourcing environment because of its charac-teristics of “one-to-many” communication. However, users attributes often change dynamically.
YU Jinxia, YANG Chaochao, ZHANG Qichao, YAN Xixi
doaj +1 more source
On the feasibility of attribute-based encryption on Internet of Things devices [PDF]
Attribute-based encryption (ABE) could be an effective cryptographic tool for the secure management of Internet of Things (IoT) devices, but its feasibility in the IoT has been under-investigated thus far.
AMbrosin, M +6 more
core +3 more sources
Efficient Privacy-Preserving Access Control of Mobile Multimedia Data in Cloud Computing
With the nature of allowing the encryptor to define the access policy before encrypting a message, Ciphertext-policy attribute-based encryption (CP-ABE) has been widely adopted as a primitive to design cloud-assisted mobile multimedia data sharing system.
Qi Li +4 more
doaj +1 more source
Search Me If You Can: Privacy-preserving Location Query Service [PDF]
Location-Based Service (LBS) becomes increasingly popular with the dramatic growth of smartphones and social network services (SNS), and its context-rich functionalities attract considerable users.
Jung, Taeho, Li, Xiang-Yang
core +2 more sources
Unified Ciphertext-Policy Weighted Attribute-Based Encryption for Sharing Data in Cloud Computing
With the rapid development of cloud computing, it is playing an increasingly important role in data sharing. Meanwhile, attribute-based encryption (ABE) has been an effective way to share data securely in cloud computing.
Wei Li +4 more
doaj +1 more source
Enhancing Secure Communication in the Cloud Through Blockchain Assisted-CP-DABE
The use of encryption is essential to protect sensitive data, but it often poses challenges when it comes to locating and retrieving information without decryption.
G. Sucharitha +4 more
doaj +1 more source
An Outsourced Attribute-Based Encryption Scheme Supporting Attribute Revocation [PDF]
Traditional Ciphertext-Policy Attribute-Based Encryption(CP-ABE) schemes have large computational overhead in key generation,decryption and attribute revocation processes.Aiming at this problem,this paper proposes an outsourced CP-ABE scheme which ...
LIU Zhusong,PENG Jiapeng
doaj +1 more source
Forward-secure hierarchical predicate encryption [PDF]
Secrecy of decryption keys is an important pre-requisite for security of any encryption scheme and compromised private keys must be immediately replaced. \emph{Forward Security (FS)}, introduced to Public Key Encryption (PKE) by Canetti, Halevi, and Katz
Gonzalez Nieto, Juan +2 more
core +2 more sources
DSVN: A Flexible and Secure Data-Sharing Model for VANET Based on Blockchain
Vehicular Ad Hoc Network (VANET) is an important part of the modern intelligent transportation system, which can provide vehicle communication at a certain distance. More importantly, VANET can provide route planning and autonomous driving for drivers by
Xiaoxuan Chen +4 more
doaj +1 more source
Longitude : a privacy-preserving location sharing protocol for mobile applications [PDF]
Location sharing services are becoming increasingly popular. Although many location sharing services allow users to set up privacy policies to control who can access their location, the use made by service providers remains a source of concern.
A. Beresford +14 more
core +3 more sources

