Results 11 to 20 of about 3,111 (159)
Hybrid Solution for Privacy-Preserving Access Control for Healthcare Data
The booming in cloud and IoT technologies has accelerated the growth of healthcare system. The IoT devices monitor the patient's health, and upload collected data as Electronic Medical Records (EMRs) to the cloud for storage and sharing.
SMITHAMOL, M. B., RAJESWARI, S.
doaj +1 more source
Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing
Public key encryption supporting equality test (referred to as PKE-ET) provides the capability of testing the equivalence between two messages encrypted under different public keys.
Qiang Wang +4 more
doaj +1 more source
Sharing photos on an open social platform with one-to-many features increases the leakage risk of information of the shared photos. Ciphertext-policy attribute-based encryption (CP-ABE) is a one-to-many public key cryptosystem, and its access policy can ...
Huaibo Sun, Hong Luo, Yan Sun
doaj +1 more source
Verifying Outsourced Decryption of CP-ABE with Signature [PDF]
Attribute-based encryption enables users to encrypt and decrypt messages based on user attributes. The computational complexities of decryption are very high. By Outsourcing decryption to the third party, it can address the problem. But the verifiability of results returned from the third party has yet to be addressed. In this paper, we introduce short
Peng Zhang, Xueyuan Wang, Hongwei Liu
openaire +1 more source
Achieving Flexible and Self-Contained Data Protection in Cloud Computing
For enterprise systems running on public clouds in which the servers are outside the control domain of the enterprise, access control that was traditionally executed by reference monitors deployed on the system servers can no longer be trusted.
Bo Lang, Jinmiao Wang, Yanxi Liu
doaj +1 more source
Large Universe CP-ABE With Whitebox Traceability
In a ciphertext-policy attribute-based encryption (CP-ABE) system, decryption keys are defined over attributes shared by multiple users. Traceability is the ability of ABE to trace the malicious users or traitors who intentionally leak the partial or modified decryption keys for profits.
Anusha Sivanandhan, Angel M Eldhose
openaire +1 more source
CP-ABE Scheme Using Selectively Hidden Tree Access Structure [PDF]
Hidden access structure is a secure operation of Ciphertext Policy Attribute Base Encryption(CP-ABE),which can effectively prevent the leakage of sensitive information.However,tree access structure used by existing CP-ABE schemes are either completely ...
HAN Shuyan, Nurmamat Helil
doaj +1 more source
Trusted access control mechanism for data with blockchain-assisted attribute encryption
In the growing demand for data sharing, how to realize fine-grained trusted access control of shared data and protect data security has become a difficult problem.
Chang Liu +5 more
doaj +1 more source
An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption
Ciphertext policy–attribute-based encryption (CP-ABE), which provides fine-grained access control and ensures data confidentiality, is widely used in data sharing.
Ronglei Hu +6 more
doaj +1 more source
Constant Ciphertext Length in CP-ABE
Ciphertext policy attribute based encryption (CP-ABE) is a technique in which user with secret key containing attributes, only able to decrypt the message if the attributes in the policy match with the attributes in secret key. The existing methods that use reasonably computable decryption policies produce the ciphertext of size at least linearly ...
Doshi, Nishant, Jinwala, Devesh
openaire +2 more sources

