Results 141 to 150 of about 3,111 (159)
Some of the next articles are maybe not open access.

Dynamic Remote Attestation on CP-ABE Algorithm

Applied Mechanics and Materials, 2014
Current remote attestation schemes in trusted cloud computing lack of dynamic measure scheme of virtual computing nodes. In this paper, by the analysis and comparison of existing remote attestation technology, we propose a trust measure of virtual computing node running state, and a remote attestation scheme based on the trust measure results and CP ...
openaire   +1 more source

Traceable and revocable CP-ABE with shorter ciphertexts

Science China Information Sciences, 2016
本文提出了一种新的“cancellation technique”,并将该新技术用于构造黑盒可追踪和可撤销的密文策略属性基加密方案的构造中,在不牺牲其他参数(公开参数长度、密钥长度等)的情况下,本文构造出一个(与当前最好结果相比)更短密文、更小计算代价的黑盒可追踪与可撤销密文策略属性基加密方案。值得一提的是,这种新的“cancellation technique”不仅仅在构造更短密文更高效的黑盒可追踪与可撤销密文策略属性基加密方案中起作用,同时也对其他加密或签名方案更短密文或者是更高效的构造提供了参考价值。
Jianting Ning   +3 more
openaire   +1 more source

Lattice CP-ABE Scheme Supporting Reduced-OBDD Structure

2020
Ciphertext attribute-based encryption (CP-ABE) schemes from lattices are considered as a flexible way of ensuring access control, which allow publishers to encrypt data for many users without worrying about quantum attacks and exponential computational inefficiencies. However, most of the proposed schemes are inefficient, inflexible, and cannot support
Eric Affum, Xiasong Zhang, Xiaofen Wang
openaire   +1 more source

CP-ABE Scheme with Revocation for Cloud Storage

2014
Cloud Computing is the next-generation architecture of IT Enterprise because of its scalability and low cost. But it also raises security issues such as the security of data which is the major constraint to the development of cloud storage. To solve the safety issues in cloud storage services for data sharing characteristics, this paper proposed a new ...
Ning Pan, Lei Sun, Xiuqing Mao
openaire   +1 more source

Efficient CP-ABE with Non-monotonic Access Structures

2017
Ciphertext policy attribute based encryption (CP-ABE) systems are suitable for supporting access control with complex attribute-based policies. But there is a few CP-ABE systems that support non-monotonic access structures. In this paper we present an efficient CP-ABE construction which supports \(\mathbf {NOT}\) operation as well as m-of-n threshold ...
Yong Cheng   +3 more
openaire   +1 more source

Multi-keyword Ranked Searchable Encryption Supporting CP-ABE Test

2019 Computing, Communications and IoT Applications (ComComAp), 2019
Internet of Things (IoT) and cloud computing are promising technologies that change the way people communicate and live. As the data collected through IoT devices often involve users’ private information and the cloud is not completely trusted, users’ private data are usually encrypted before being uploaded to cloud for security purposes.
Chuxin Wu   +3 more
openaire   +1 more source

CP-ABE Based Access Control for Cloud Storage

2016
CP-ABE (Cipher-text Policy Attribute Based Encryption) can help providing reliable, fine-grained access control in untrusted cloud storage environment, since users can access to data files only if their attributes satisfy the access policies associated with the files. However, CP-ABE has two main drawbacks: its policies are not expressed using standard
Yong Wang   +4 more
openaire   +1 more source

Data Confirmation Scheme based on Auditable CP-ABE

2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), 2022
Lingyun Zhang, Yuling Chen, Xiaobin Qian
openaire   +1 more source

Identity Revocable CP-ABE

2020
Dijiang Huang, Qiuxiang Dong, Yan Zhu
openaire   +1 more source

Efficient and Secure Data Storage CP-ABE Analysis Algorithm

2019
In the contemporary digital environment, secure search over encrypted data is necessary to prevent the unauthorized data usage practices. To provide data privacy and security fine grained access control is important. For having data privacy data have to be stored onto the cloud in an encrypted form and have to be decrypted before retrieving the message.
V. SenthurSelvi   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy