Results 31 to 40 of about 20,722 (263)

Ciphertext-Policy Hierarchical Attribute-Based Encryption Against Key-Delegation Abuse for IoT-Connected Healthcare System

open access: yesIEEE Access, 2020
With the maturity of technologies such as Internet of Things (IoT) and Cloud Computing, more and more medical institutions share patient's medical data in the IoT-connected healthcare system, whereas it also brings hidden dangers to data security and ...
Xi Chen   +3 more
doaj   +1 more source

Hierarchical Identity-Based Online/Offline Encryption

open access: yes2008 The 9th International Conference for Young Computer Scientists, 2008
The notion of identity-based online/offline encryption (IBOOE) was recently introduced by Guo, Mu and Chen in FC 2008. In an IBOOE system, the encryption is split into online and offline phases. The offline phase is performed prior to the arrival of a message and the recipient's public key (or,identity).
Zhongren Liu   +4 more
openaire   +2 more sources

Accountable and Verifiable Outsourced Hierarchical Attribute Encryption Scheme Based on Blockchain [PDF]

open access: yesJisuanji gongcheng
With the advent of the big data era, the proliferation of information types has increased the requirements for controlled data sharing. Decentralized Attribute-Based Encryption (DABE) has been widely studied in this context to enable fine-grained access ...
JIANG Qiqi, ZHANG Liang, PENG Lingqi, KAN Haibin
doaj   +1 more source

Hierarchical blockchain structure for node authentication in IoT networks

open access: yesEgyptian Informatics Journal, 2022
Internet of Things (IoT) networks are large peer-to-peer networks of small devices that require a competent security system that is scalable and adaptable to the limited resources of the IoT devices. Node authentication is a crucial part of IoT security.
Mahmoud Tayseer Al Ahmed   +3 more
doaj   +1 more source

The Melbourne Shuffle: Improving Oblivious Storage in the Cloud [PDF]

open access: yes, 2014
We present a simple, efficient, and secure data-oblivious randomized shuffle algorithm. This is the first secure data-oblivious shuffle that is not based on sorting. Our method can be used to improve previous oblivious storage solutions for network-based
B. Pinkas   +6 more
core   +1 more source

Time and Attribute Based Dual Access Control and Data Integrity Verifiable Scheme in Cloud Computing Applications

open access: yesIEEE Access, 2019
In the era of big data, cloud-based industrial applications can provide available and convenient data access for resource-constrained smart devices. Attribute-based encryption can be used to ensure data security while providing fine-grained data access ...
Qian Zhang   +4 more
doaj   +1 more source

Identity Based Group Signatures from Hierarchical Identity-Based Encryption [PDF]

open access: yes, 2009
A number of previous papers explored the notion of identity-based group signature. We present a generic construction of identity-based group signatures. Our construction is based on the Naor transformation of a identity-based signature out of an identity-based encryption, adjusted to hierarchical identity-based encryption.
Nigel P. Smart, Bogdan Warinschi
openaire   +1 more source

Zero trust anonymous access algorithm for multi cloud storage system based on CP-ABE

open access: yesEgyptian Informatics Journal
This paper proposes a zero-trust anonymous access algorithm for multi-cloud storage systems based on CP-ABE (Ciphertext-Policy Attribute-Based Encryption).
Jun Tian
doaj   +1 more source

ID-Based User-Centric Data Usage Auditing Scheme for Distributed Environments

open access: yesFrontiers in Blockchain, 2020
Recent years have witnessed the trend of increasingly relying on remote and distributed infrastructures, mainly owned and managed by third parties. This increased the number of reported incidents of security breaches compromising users' personal data ...
Nesrine Kaaniche   +4 more
doaj   +1 more source

Biometric identity-based cryptography for e-Government environment [PDF]

open access: yes, 2014
Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks.
Aljeaid, D, Langensiepen, C, Ma, X
core   +1 more source

Home - About - Disclaimer - Privacy