Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions
We propose two new ciphertext policy attribute-based encryption (CP-ABE) schemes where the access policy is defined by AND-gate with wildcard. In the first scheme, we present a new technique that uses only one group element to represent an attribute, while the existing ABE schemes of the same type need to use three different group elements to represent
Tran Viet Xuan Phuong +2 more
openaire +2 more sources
TAAC: Secure and Efficient Time-Attribute-Based Access Control Scheme in SDN-IoT
The convergence of software-defined networking (SDN) and the Internet of Things (IoT) provides a scalable method for handling the considerable volumes of data produced by IoT devices.
Jiamin Hu +6 more
doaj +1 more source
Ciphertext Policy Attribute Based Encryption with Intel SGX
Modern computing environments demand robust security measures to protect sensitive data and resources. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a well-established encryption technique known for its fine-grained access control capabilities.
Suryawanshi, Vivek, Sural, Shamik
openaire +2 more sources
Multi-authority attribute-based encryption with efficient revocation
Multi-authority attribute-based encryption was very suitable for data access control in a cloud storage environment.However,efficient user revocation in multi-authority attribute-based encryption remains a challenging problem that prevents it from ...
Kai ZHANG +4 more
doaj +2 more sources
Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage. [PDF]
Wang S, Guo K, Zhang Y.
europepmc +1 more source
Correction: Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage. [PDF]
PLOS ONE Staff.
europepmc +1 more source
ELiPS-based Ciphertext-Policy Attribute-Based Encryption
Le Hoang Anh +5 more
openaire +2 more sources
An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things. [PDF]
Guo C +5 more
europepmc +1 more source
Distributed Identity Authentication with Lenstra-Lenstra-Lovász Algorithm-Ciphertext Policy Attribute-Based Encryption from Lattices: An Efficient Approach Based on Ring Learning with Errors Problem. [PDF]
Yuan Q +6 more
europepmc +1 more source
Revocable and Traceable Decentralized ABE for P2P Networks. [PDF]
Gao D, Xu H, Qian S.
europepmc +1 more source

