Results 1 to 10 of about 3,092 (140)
Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT [PDF]
Devices in the Internet of Things (IoT) usually use cloud storage and cloud computing to save storage and computing cost. Therefore, the efficient realization of one-to-many communication of data on the premise of ensuring the security of cloud storage ...
Juyan Li, Ye Fan, Xuefen Bian, Qi Yuan
doaj +2 more sources
mRLWE-CP-ABE: A revocable CP-ABE for post-quantum cryptography
We address the problem of user fast revocation in the lattice-based Ciphertext Policy Attribute-Based Encryption (CP-ABE) by extending the scheme originally introduced by Zhang and Zhang [Zhang J, Zhang Z.
Cianfriglia Marco +2 more
doaj +3 more sources
An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things [PDF]
The Internet of Things (IoT) is a heterogeneous network composed of numerous dynamically connected devices. While it brings convenience, the IoT also faces serious challenges in data security.
Chong Guo +5 more
doaj +2 more sources
Partially policy hidden CP-ABE supporting dynamic policy updating
Ciphertext-policy attribute-based encryption (CP-ABE) was considered to be appropriate for cloud storage.However,under traditional CP-ABE scheme which was limited in terms of the scale of the data and the quantities of the attributes,computation and ...
Zuo-bin YING +2 more
doaj +3 more sources
Lattices-Inspired CP-ABE from LWE Scheme for Data Access and Sharing Based on Blockchain
To address the quantum attacks on number theory-based ciphertext policy attribute-based encryption (CP-ABE), and to avoid private key leakage problems by relying on a trustworthy central authority, we propose a lattice-inspired CP-ABE scheme for data ...
Taowei Chen +4 more
doaj +1 more source
A CP-ABE Scheme Based on Lattice LWE and Its Security Analysis
In recent years, the research on ciphertext-policy attribute-based encryption (CP-ABE) scheme design based on learning with errors (LWE) has been a challenging problem, and many researchers have made a lot of attempts at it.
Yunfei Yao +4 more
doaj +1 more source
Fog computing is increasingly popular partly due to its capability to minimize data transfer and latency requirements, for example by moving some of the computational operations away from the cloud servers and closer to the users. To achieve fine-grained
Jing Zhao +2 more
doaj +1 more source
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption [PDF]
Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data provider encrypts a secret message and then sends the ciphertext to the receivers according to the access policy which she/he decides.
Yi-Fan Tseng, Chun-I Fan, Chih-Wen Lin
doaj +3 more sources
A CP-ABE Scheme Supporting Arithmetic Span Programs [PDF]
Attribute-based encryption achieves fine-grained access control, especially in a cloud computing environment. In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, the ciphertexts are associated with the access policies, while the secret keys are determined by the attributes. In recent years, people have tried to find more effective access
Chao Ma, Haiying Gao, Duo Wei
openaire +1 more source
Attribute-based encryption schema with group signatures
Cipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data.In CP-ABE,When the users access the cipher text,the access structure and the cipher text were sent to the users.However,the access structure is ...
Xinglan ZHANG, Yao CUI
doaj +3 more sources

