Results 31 to 40 of about 5,325 (187)
Adaptable Ciphertext-Policy Attribute-Based Encryption
In this paper, we introduce a new cryptographic primitive, called adaptable ciphertext-policy attribute-based encryption CP-ABE. Adaptable CP-ABE extends the traditional CP-ABE by allowing a semi-trusted proxy to modify a ciphertext under one access policy into ciphertexts of the same plaintext under any other access policies; the proxy, however ...
LAI, Junzuo +3 more
openaire +3 more sources
Proposal for Quantum Ciphertext-Policy Attribute-Based Encryption
12 ...
Samanta, Asmita +2 more
openaire +2 more sources
An Attribute-based Encryption Scheme for Ciphertext Policy that Supports Attribute Revocation [PDF]
The traditional single-authorization Attribute-Based Encryption(ABE) schemes are limited by the high computing overhead and the poor security.Based on secure two-party computing protocols,this paper proposes a multi-authorization ciphertext policy ABE ...
WANG Jingyu, ZHOU Xuejuan
doaj +1 more source
ABAKA : a novel attribute-based k-anonymous collaborative solution for LBSs [PDF]
The increasing use of mobile devices, along with advances in telecommunication systems, increased the popularity of Location-Based Services (LBSs). In LBSs, users share their exact location with a potentially untrusted Location-Based Service Provider ...
Ambrosin, M +3 more
core +2 more sources
ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION [PDF]
In classical encryption schemes, data is encrypted under a single key that is associated with a user or group. In Ciphertext-Policy Attribute-Based Encryption(CP-ABE) keys are associated with attributes of users, given to them by a central trusted authority, and data is en- crypted under a logical formula over these attributes.
Sascha Muller +2 more
openaire +1 more source
Ad Hoc Multi-Input Functional Encryption [PDF]
Consider sources that supply sensitive data to an aggregator. Standard encryption only hides the data from eavesdroppers, but using specialized encryption one can hope to hide the data (to the extent possible) from the aggregator itself.
Agrawal, Shweta +5 more
core +2 more sources
Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test
Attribute-based encryption is a popular cryptographic technology to protect the privacy of clients' data in cloud computing. In order to make the scheme have the functionality of comparing ciphertext, Zhu et al. combined concepts of key-policy attributed-
Yongjian Liao +5 more
doaj +1 more source
An Enhanced Approach for CP-ABE with Proxy Re-encryption in IoT Paradigm
In Internet of Things (IoT), encryption is a technique in which plaintext is converted to ciphertext to make it non-recovered by the attacker without secret key.
Nishant Doshi
doaj +1 more source
Ciphertext policy Attribute based Encryption with anonymous access policy
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt the encrypted message. The policy can be formed with the help of attributes. In CP-ABE, access policy is sent along with the ciphertext. We propose a method in which the access policy need not be sent along with the ciphertext, by which we are able
Balu, A., Kuppusamy, K.
openaire +2 more sources
A Survey of Access Control Models in Wireless Sensor Networks [PDF]
Copyright 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/)Wireless sensor ...
Christianson, B. +3 more
core +2 more sources

