Results 61 to 70 of about 3,111 (159)
CP‐ABE with outsourced decryption and directionally hidden policy
AbstractCiphertext‐policy attribute‐based encryption (CP‐ABE) is a novel cryptographic primitive for access controlling. However, the existing CP‐ABE schemes are very inefficient as the decryptions involve many expensive pairing operations. Another drawback is that the access policy itself may disclose some privacies of the users.
Zhiwei Wang, Wenyang Liu
openaire +1 more source
Landscapes of HLA Mismatching in Contemporary Unrelated Haematopoietic Cell Transplantation
ABSTRACT Haematopoietic cell transplantation (HCT) with HLA‐mismatched unrelated donors (MMUD) offers access to curative therapy for patients lacking well‐matched donors. Accumulating evidence suggests that functional matching among allele‐mismatched pairs can significantly influence patient outcomes.
Esteban Arrieta‐Bolaños +21 more
wiley +1 more source
Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic technique for fine-grained access control of outsourced data in the cloud. However, some drawbacks of key management hinder the popularity of its application. One drawback
Guofeng Lin, Hanshu Hong, Zhixin Sun
doaj +1 more source
Efficient pairing-free CP-ABE based on ordered binary decision diagram
To improve the computational efficiency of ABE,its access structure was optimized and a pairing-free CP-ABE scheme based on ordered binary decision diagram (OBDD) was proposed.Based on the elliptic curve cryptography,the complex bilinear pairing ...
Sheng DING, Jin CAO, Hui LI
doaj +2 more sources
Zero trust anonymous access algorithm for multi cloud storage system based on CP-ABE
This paper proposes a zero-trust anonymous access algorithm for multi-cloud storage systems based on CP-ABE (Ciphertext-Policy Attribute-Based Encryption).
Jun Tian
doaj +1 more source
Efficient and Secure Access Control Scheme in the Standard Model for Vehicular Cloud Computing
Vehicular networking involves the storage, compute, and analysis of massive vehicular data. Vehicular cloud computing, as a special cloud computing platform, seamlessly combines vehicular ad hoc networks and conventional cloud computing.
Wei Luo, Wenping Ma
doaj +1 more source
Performance Evaluation of CP-ABE Schemes under Constrained Devices
Abstract Recently, Internet of Things devices (IoT) have become a hot spot for researchers. Their industrial importance is growing exponentially day after day. Statistics show that the number of IoT devices will reach fifty billions by 2020. In addition, IoT applications are backed through the Cloud where data is stored and processed by gigantic ...
Mohammad Bany Taha +2 more
openaire +1 more source
Verifiable access control scheme based on unpaired CP-ABE in fog computing
Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is ...
Jiangtao DONG, Peiwen YAN, Ruizhong DU
doaj +2 more sources
Nowadays, the integration of blockchain technology with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has drawn the researcher attention because it can provide key security auditing and transaction traceability in the context of data sharing ...
Zhixin Ren +3 more
doaj +1 more source
Cross-primitive comparison in CP-ABE
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a cornerstone technique for fine-grained access control in encrypted data sharing, with pairing-based schemes having established the de facto standard.
Gasparini Lorenzo +3 more
doaj +1 more source

