Results 11 to 20 of about 3,111 (159)

Hybrid Solution for Privacy-Preserving Access Control for Healthcare Data

open access: yesAdvances in Electrical and Computer Engineering, 2017
The booming in cloud and IoT technologies has accelerated the growth of healthcare system. The IoT devices monitor the patient's health, and upload collected data as Electronic Medical Records (EMRs) to the cloud for storage and sharing.
SMITHAMOL, M. B., RAJESWARI, S.
doaj   +1 more source

Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing

open access: yesIEEE Access, 2018
Public key encryption supporting equality test (referred to as PKE-ET) provides the capability of testing the equivalence between two messages encrypted under different public keys.
Qiang Wang   +4 more
doaj   +1 more source

Progressive Image Restoration Based on CP-ABE With Constant-Size Ciphertext and Constant Bilinear Calculation

open access: yesIEEE Access, 2019
Sharing photos on an open social platform with one-to-many features increases the leakage risk of information of the shared photos. Ciphertext-policy attribute-based encryption (CP-ABE) is a one-to-many public key cryptosystem, and its access policy can ...
Huaibo Sun, Hong Luo, Yan Sun
doaj   +1 more source

Verifying Outsourced Decryption of CP-ABE with Signature [PDF]

open access: yesProceedings of the 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering 2015, 2015
Attribute-based encryption enables users to encrypt and decrypt messages based on user attributes. The computational complexities of decryption are very high. By Outsourcing decryption to the third party, it can address the problem. But the verifiability of results returned from the third party has yet to be addressed. In this paper, we introduce short
Peng Zhang, Xueyuan Wang, Hongwei Liu
openaire   +1 more source

Achieving Flexible and Self-Contained Data Protection in Cloud Computing

open access: yesIEEE Access, 2017
For enterprise systems running on public clouds in which the servers are outside the control domain of the enterprise, access control that was traditionally executed by reference monitors deployed on the system servers can no longer be trusted.
Bo Lang, Jinmiao Wang, Yanxi Liu
doaj   +1 more source

Large Universe CP-ABE With Whitebox Traceability

open access: yesInternational Journal on Cybernetics & Informatics, 2016
In a ciphertext-policy attribute-based encryption (CP-ABE) system, decryption keys are defined over attributes shared by multiple users. Traceability is the ability of ABE to trace the malicious users or traitors who intentionally leak the partial or modified decryption keys for profits.
Anusha Sivanandhan, Angel M Eldhose
openaire   +1 more source

CP-ABE Scheme Using Selectively Hidden Tree Access Structure [PDF]

open access: yesJisuanji gongcheng, 2020
Hidden access structure is a secure operation of Ciphertext Policy Attribute Base Encryption(CP-ABE),which can effectively prevent the leakage of sensitive information.However,tree access structure used by existing CP-ABE schemes are either completely ...
HAN Shuyan, Nurmamat Helil
doaj   +1 more source

Trusted access control mechanism for data with blockchain-assisted attribute encryption

open access: yesHigh-Confidence Computing
In the growing demand for data sharing, how to realize fine-grained trusted access control of shared data and protect data security has become a difficult problem.
Chang Liu   +5 more
doaj   +1 more source

An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption

open access: yesSensors, 2023
Ciphertext policy–attribute-based encryption (CP-ABE), which provides fine-grained access control and ensures data confidentiality, is widely used in data sharing.
Ronglei Hu   +6 more
doaj   +1 more source

Constant Ciphertext Length in CP-ABE

open access: yes, 2012
Ciphertext policy attribute based encryption (CP-ABE) is a technique in which user with secret key containing attributes, only able to decrypt the message if the attributes in the policy match with the attributes in secret key. The existing methods that use reasonably computable decryption policies produce the ciphertext of size at least linearly ...
Doshi, Nishant, Jinwala, Devesh
openaire   +2 more sources

Home - About - Disclaimer - Privacy