Results 81 to 90 of about 5,378 (199)

Hitchhiker's Guide to the Swampland: The Cosmologist's Handbook to the String‐Theoretical Swampland Programme

open access: yesFortschritte der Physik, Volume 74, Issue 4, April 2026.
Abstract String theory has strong implications for cosmology, implying the absence of a cosmological constant, ruling out single‐field slow‐roll inflation, and that black holes decay. The origins of these statements are elucidated within the string‐theoretical swampland programme.
Kay Lehnert
wiley   +1 more source

A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing

open access: yesIEEE Access, 2017
Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic technique for fine-grained access control of outsourced data in the cloud. However, some drawbacks of key management hinder the popularity of its application. One drawback
Guofeng Lin, Hanshu Hong, Zhixin Sun
doaj   +1 more source

Efficient pairing-free CP-ABE based on ordered binary decision diagram

open access: yesTongxin xuebao, 2019
To improve the computational efficiency of ABE,its access structure was optimized and a pairing-free CP-ABE scheme based on ordered binary decision diagram (OBDD) was proposed.Based on the elliptic curve cryptography,the complex bilinear pairing ...
Sheng DING, Jin CAO, Hui LI
doaj   +2 more sources

Zero trust anonymous access algorithm for multi cloud storage system based on CP-ABE

open access: yesEgyptian Informatics Journal
This paper proposes a zero-trust anonymous access algorithm for multi-cloud storage systems based on CP-ABE (Ciphertext-Policy Attribute-Based Encryption).
Jun Tian
doaj   +1 more source

Efficient and Secure Access Control Scheme in the Standard Model for Vehicular Cloud Computing

open access: yesIEEE Access, 2018
Vehicular networking involves the storage, compute, and analysis of massive vehicular data. Vehicular cloud computing, as a special cloud computing platform, seamlessly combines vehicular ad hoc networks and conventional cloud computing.
Wei Luo, Wenping Ma
doaj   +1 more source

Performance Evaluation of CP-ABE Schemes under Constrained Devices

open access: yesProcedia Computer Science, 2019
Abstract Recently, Internet of Things devices (IoT) have become a hot spot for researchers. Their industrial importance is growing exponentially day after day. Statistics show that the number of IoT devices will reach fifty billions by 2020. In addition, IoT applications are backed through the Cloud where data is stored and processed by gigantic ...
Mohammad Bany Taha   +2 more
openaire   +1 more source

Verifiable access control scheme based on unpaired CP-ABE in fog computing

open access: yesTongxin xuebao, 2021
Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is ...
Jiangtao DONG, Peiwen YAN, Ruizhong DU
doaj   +2 more sources

Blockchain-based CP-ABE data sharing and privacy-preserving scheme using distributed KMS and zero-knowledge proof

open access: yesJournal of King Saud University: Computer and Information Sciences
Nowadays, the integration of blockchain technology with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has drawn the researcher attention because it can provide key security auditing and transaction traceability in the context of data sharing ...
Zhixin Ren   +3 more
doaj   +1 more source

Cross-primitive comparison in CP-ABE

open access: yesJournal of Mathematical Cryptology
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is a cornerstone technique for fine-grained access control in encrypted data sharing, with pairing-based schemes having established the de facto standard.
Gasparini Lorenzo   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy