Results 141 to 150 of about 3,111 (159)
Some of the next articles are maybe not open access.
Dynamic Remote Attestation on CP-ABE Algorithm
Applied Mechanics and Materials, 2014Current remote attestation schemes in trusted cloud computing lack of dynamic measure scheme of virtual computing nodes. In this paper, by the analysis and comparison of existing remote attestation technology, we propose a trust measure of virtual computing node running state, and a remote attestation scheme based on the trust measure results and CP ...
openaire +1 more source
Traceable and revocable CP-ABE with shorter ciphertexts
Science China Information Sciences, 2016本文提出了一种新的“cancellation technique”,并将该新技术用于构造黑盒可追踪和可撤销的密文策略属性基加密方案的构造中,在不牺牲其他参数(公开参数长度、密钥长度等)的情况下,本文构造出一个(与当前最好结果相比)更短密文、更小计算代价的黑盒可追踪与可撤销密文策略属性基加密方案。值得一提的是,这种新的“cancellation technique”不仅仅在构造更短密文更高效的黑盒可追踪与可撤销密文策略属性基加密方案中起作用,同时也对其他加密或签名方案更短密文或者是更高效的构造提供了参考价值。
Jianting Ning +3 more
openaire +1 more source
Lattice CP-ABE Scheme Supporting Reduced-OBDD Structure
2020Ciphertext attribute-based encryption (CP-ABE) schemes from lattices are considered as a flexible way of ensuring access control, which allow publishers to encrypt data for many users without worrying about quantum attacks and exponential computational inefficiencies. However, most of the proposed schemes are inefficient, inflexible, and cannot support
Eric Affum, Xiasong Zhang, Xiaofen Wang
openaire +1 more source
CP-ABE Scheme with Revocation for Cloud Storage
2014Cloud Computing is the next-generation architecture of IT Enterprise because of its scalability and low cost. But it also raises security issues such as the security of data which is the major constraint to the development of cloud storage. To solve the safety issues in cloud storage services for data sharing characteristics, this paper proposed a new ...
Ning Pan, Lei Sun, Xiuqing Mao
openaire +1 more source
Efficient CP-ABE with Non-monotonic Access Structures
2017Ciphertext policy attribute based encryption (CP-ABE) systems are suitable for supporting access control with complex attribute-based policies. But there is a few CP-ABE systems that support non-monotonic access structures. In this paper we present an efficient CP-ABE construction which supports \(\mathbf {NOT}\) operation as well as m-of-n threshold ...
Yong Cheng +3 more
openaire +1 more source
Multi-keyword Ranked Searchable Encryption Supporting CP-ABE Test
2019 Computing, Communications and IoT Applications (ComComAp), 2019Internet of Things (IoT) and cloud computing are promising technologies that change the way people communicate and live. As the data collected through IoT devices often involve users’ private information and the cloud is not completely trusted, users’ private data are usually encrypted before being uploaded to cloud for security purposes.
Chuxin Wu +3 more
openaire +1 more source
CP-ABE Based Access Control for Cloud Storage
2016CP-ABE (Cipher-text Policy Attribute Based Encryption) can help providing reliable, fine-grained access control in untrusted cloud storage environment, since users can access to data files only if their attributes satisfy the access policies associated with the files. However, CP-ABE has two main drawbacks: its policies are not expressed using standard
Yong Wang +4 more
openaire +1 more source
Data Confirmation Scheme based on Auditable CP-ABE
2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), 2022Lingyun Zhang, Yuling Chen, Xiaobin Qian
openaire +1 more source
Efficient and Secure Data Storage CP-ABE Analysis Algorithm
2019In the contemporary digital environment, secure search over encrypted data is necessary to prevent the unauthorized data usage practices. To provide data privacy and security fine grained access control is important. For having data privacy data have to be stored onto the cloud in an encrypted form and have to be decrypted before retrieving the message.
V. SenthurSelvi +3 more
openaire +1 more source

