Results 51 to 60 of about 5,325 (187)

On efficient ciphertext-policy attribute based encryption and broadcast encryption [PDF]

open access: yesProceedings of the 17th ACM conference on Computer and communications security, 2010
Existing CP-ABE schemes incur very large ciphertext size, which increases linearly with respect to the number of attributes in the access policy. Large ciphertext prevents CP-ABE from being adopted in the communication constrained environments. In this paper, we proposed a new construction of CP-ABE, named Constant-size CP-ABE (denoted as CCP-ABE) that
Zhibin Zhou, Dijiang Huang
openaire   +1 more source

A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication

open access: yesCAAI Transactions on Intelligence Technology, Volume 11, Issue 2, Page 349-366, April 2026.
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley   +1 more source

Fine-grained attribute update and outsourcing computing access control scheme in fog computing

open access: yesTongxin xuebao, 2021
To slove the problem that in the fog computing environment with comparatively high low latency demand, ciphertext policy attribute based encryption (CP-ABE) faced the problems of high encryption and decryption overhead and low efficiency of attribute ...
Ruizhong DU, Peiwen YAN, Yan LIU
doaj   +2 more sources

Revocable attribute-based proxy re-encryption

open access: yesJournal of Mathematical Cryptology, 2021
Attribute-based proxy re-encryption (ABPRE), which combines the notions of proxy re-encryption (PRE) and attribute-based encryption (ABE), allows a semi-trusted proxy with re-encryption key to transform a ciphertext under a particular access policy into ...
Luo Fucai, Al-Kuwari Saif
doaj   +1 more source

Network Security Empowered Digital Teaching Data Protection Algorithm for Ceramic Technology

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
In this paper, a complete algorithm system covering sensitivity identification, feature fusion, encrypted transmission and cultural image protection is established based on the ceramic teaching scene enabled by network security. ABSTRACT The digitalization of ceramic technology teaching generates sensitive multi‐modal data, including personal ...
Yuting Zhu   +3 more
wiley   +1 more source

Ciphertext Policy Attribute based Homomorphic Encryption (CP-ABHERLWE): a fine-grained access control on outsourced cloud data computation [PDF]

open access: yes, 2016
Recently, homomorphic encryption is becoming one of the holy grail in modern cryptography research and serve as a promising tools to protect outsourced data solutions on cloud service providers.
Azman Samsudin, Tan, Soo Fun
core  

A Cloud Access Control Scheme Supporting Fine-grained Attribute Change [PDF]

open access: yesJisuanji gongcheng, 2018
For cloud data access control research,there are many problems such as large cost of attribute change and inflexibility.On the basis of ciphertext policy Attribute-based Encryption(ABE),this paper proposes a scheme supporting fine-grained attribute ...
TAN Yuesheng,XING Chenshuo,WANG Jingyu
doaj   +1 more source

Data Querying with Ciphertext Policy Attribute Based Encryption

open access: yes, 2022
Data encryption limits the power and efficiency of queries. Direct processing of encrypted data should ideally be possible to avoid the need for data decryption, processing, and re-encryption. It is vital to keep the data searchable and sortable. That is, some information is intentionally leaked.
Almarwani, Maryam   +2 more
openaire   +2 more sources

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits

open access: yes, 2015
Motivated by the problem of simultaneously preserving confidentiality and usability of data outsourced to third-party clouds, we present two different database encryption schemes that largely hide data but reveal enough information to support a wide ...
Basin D.   +8 more
core   +1 more source

Enhancing E‐Commerce Security Based on Involution Function Using Twin Key AES Cipher

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
In the realm of surging e‐commerce data and increasing digital transactions, ensuring end‐to‐end security is paramount to protect sensitive information and maintain user trust. The Advanced Encryption Standard (AES), a cornerstone of network security, relies on symmetric key encryption for secure communication.
Biresh Kumar   +11 more
wiley   +1 more source

Home - About - Disclaimer - Privacy