Results 31 to 40 of about 5,325 (187)

Adaptable Ciphertext-Policy Attribute-Based Encryption

open access: yes, 2014
In this paper, we introduce a new cryptographic primitive, called adaptable ciphertext-policy attribute-based encryption CP-ABE. Adaptable CP-ABE extends the traditional CP-ABE by allowing a semi-trusted proxy to modify a ciphertext under one access policy into ciphertexts of the same plaintext under any other access policies; the proxy, however ...
LAI, Junzuo   +3 more
openaire   +3 more sources

Proposal for Quantum Ciphertext-Policy Attribute-Based Encryption

open access: yes, 2022
12 ...
Samanta, Asmita   +2 more
openaire   +2 more sources

An Attribute-based Encryption Scheme for Ciphertext Policy that Supports Attribute Revocation [PDF]

open access: yesJisuanji gongcheng, 2021
The traditional single-authorization Attribute-Based Encryption(ABE) schemes are limited by the high computing overhead and the poor security.Based on secure two-party computing protocols,this paper proposes a multi-authorization ciphertext policy ABE ...
WANG Jingyu, ZHOU Xuejuan
doaj   +1 more source

ABAKA : a novel attribute-based k-anonymous collaborative solution for LBSs [PDF]

open access: yes, 2016
The increasing use of mobile devices, along with advances in telecommunication systems, increased the popularity of Location-Based Services (LBSs). In LBSs, users share their exact location with a potentially untrusted Location-Based Service Provider ...
Ambrosin, M   +3 more
core   +2 more sources

ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION [PDF]

open access: yesBulletin of the Korean Mathematical Society, 2009
In classical encryption schemes, data is encrypted under a single key that is associated with a user or group. In Ciphertext-Policy Attribute-Based Encryption(CP-ABE) keys are associated with attributes of users, given to them by a central trusted authority, and data is en- crypted under a logical formula over these attributes.
Sascha Muller   +2 more
openaire   +1 more source

Ad Hoc Multi-Input Functional Encryption [PDF]

open access: yes, 2019
Consider sources that supply sensitive data to an aggregator. Standard encryption only hides the data from eavesdroppers, but using specialized encryption one can hope to hide the data (to the extent possible) from the aggregator itself.
Agrawal, Shweta   +5 more
core   +2 more sources

Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test

open access: yesIEEE Access, 2018
Attribute-based encryption is a popular cryptographic technology to protect the privacy of clients' data in cloud computing. In order to make the scheme have the functionality of comparing ciphertext, Zhu et al. combined concepts of key-policy attributed-
Yongjian Liao   +5 more
doaj   +1 more source

An Enhanced Approach for CP-ABE with Proxy Re-encryption in IoT Paradigm

open access: yesJordanian Journal of Computers and Information Technology, 2022
In Internet of Things (IoT), encryption is a technique in which plaintext is converted to ciphertext to make it non-recovered by the attacker without secret key.
Nishant Doshi
doaj   +1 more source

Ciphertext policy Attribute based Encryption with anonymous access policy

open access: yesInternational Journal of Peer to Peer Networks, 2010
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt the encrypted message. The policy can be formed with the help of attributes. In CP-ABE, access policy is sent along with the ciphertext. We propose a method in which the access policy need not be sent along with the ciphertext, by which we are able
Balu, A., Kuppusamy, K.
openaire   +2 more sources

A Survey of Access Control Models in Wireless Sensor Networks [PDF]

open access: yes, 2014
Copyright 2014 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/)Wireless sensor ...
Christianson, B.   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy