Design of Crowdsourcing Supply Chain Platform Based on Ontology and Blockchain
In this paper, a novel crowdsourcing supply chain platform is proposed based on ontology and blockchain. The matching of tasks and candidate workers has been automatically achieved by designing some ontologies and SWRL rules. The quality of the submitted solutions can be effectively evaluated by the proposed improved confidence‐weighted voting ...
Yaohui Wu +3 more
wiley +1 more source
Simplified Ciphertext Policy Attribute Based Encryption for Multimedia Applications
Abstract In this modern age we generate data from various sophisticated systems and technologies for our personal use, the security and privacy of the data becomes a major concern while sharing it over the cloud platform. The conventional CP-ABE scheme is used to secure different types of data.The CP-ABE uses the access policy in the form of access ...
J. Joshua Daniel Raj +2 more
openaire +1 more source
Modelling a Reliable Multimedia Transmission Approach for Medical Wireless Sensor Networks
The process of secret key sharing utilises the sender's public secret key and the receiver's private secret key to generate a shared secret key between the two devices. This same secret key generation method applies to communication between a sensor and a base station, whether in single‐hop or multi‐hop scenarios. Once the secret key is generated, data
R. Nidhya +7 more
wiley +1 more source
Secure and Editable: A Blockchain Voting System Based on Chameleon Hash With Ephemeral Trapdoors
Blockchain technology has become a popular choice for electronic voting systems due to its transparency, security, and decentralization. However, it is not a perfect solution, as its inherent immutability poses challenges in blockchain‐based e‐voting systems.
Qiankun Zheng +4 more
wiley +1 more source
Group-oriented ciphertext-policy attribute-based encryption with expressive access policy
Based on the study of the traditional attribute-based encryption,a scheme called group-oriented ciphertext-policy attribute-based encryption was proposed.In the scheme,the access policy consists of AND-gate and OR-gate.Users were split up into different ...
Yang LI,Jiang-hua LIU,Wei WU
doaj +3 more sources
A Secure Access Framework for IoT–Cloud Integration With Blockchain and Bi‐GCN
Digital advancements have made cloud computing and IoT essential for innovative environments such as healthcare and industry. Cloud platforms offer scalable compute and storage capabilities, whereas IoT devices generate real‐time data. However, there are significant challenges faced while integrating the IoT with cloud to achieve robust, scalable, and ...
Kavitha M. S. +2 more
wiley +1 more source
Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing
Objectives: Although the traditional attribute-based encryption scheme achieves one-to-many access control,there are still challenges such as single point of failure,low efficiency,no support for data sharing,and privacy leakage.To solve these problems,a
Ruizhong DU, Tianhe ZHANG, Pengliang SHI
doaj +2 more sources
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
10.1016/j.ins.2014.01.035 Attribute-based encryption (ABE) systems allow encrypting to uncertain receivers by means of an access policy specifying the attributes that the intended receivers should possess. ABE promises to deliver fine-grained access control of encrypted data.
Deng, Hua +6 more
openaire +2 more sources
An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption. [PDF]
Hu R +6 more
europepmc +1 more source
mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography
We address the problem of user fast revocation in the lattice-based Ciphertext Policy Attribute-Based Encryption (CP-ABE) by extending the scheme originally introduced by Zhang and Zhang [Zhang J, Zhang Z.
Cianfriglia Marco +2 more
doaj +1 more source

