Results 71 to 80 of about 753 (173)

Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions

open access: yesIEEE Transactions on Information Forensics and Security, 2016
We propose two new ciphertext policy attribute-based encryption (CP-ABE) schemes where the access policy is defined by AND-gate with wildcard. In the first scheme, we present a new technique that uses only one group element to represent an attribute, while the existing ABE schemes of the same type need to use three different group elements to represent
Tran Viet Xuan Phuong   +2 more
openaire   +2 more sources

TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT

open access: yesIET Information Security
The convergence of software-defined networking (SDN) and the Internet of Things (IoT) provides a scalable method for handling the considerable volumes of data produced by IoT devices.
Jiamin Hu   +6 more
doaj   +1 more source

Ciphertext Policy Attribute Based Encryption with Intel SGX

open access: yes
Modern computing environments demand robust security measures to protect sensitive data and resources. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a well-established encryption technique known for its fine-grained access control capabilities.
Suryawanshi, Vivek, Sural, Shamik
openaire   +2 more sources

Multi-authority attribute-based encryption with efficient revocation

open access: yesTongxin xuebao, 2017
Multi-authority attribute-based encryption was very suitable for data access control in a cloud storage environment.However,efficient user revocation in multi-authority attribute-based encryption remains a challenging problem that prevents it from ...
Kai ZHANG   +4 more
doaj   +2 more sources

ELiPS-based Ciphertext-Policy Attribute-Based Encryption

open access: yesELiPS-based Ciphertext-Policy Attribute-Based Encryption
Le Hoang Anh   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy