Secured and Privacy-Preserving Multi-Authority Access Control System for Cloud-Based Healthcare Data Sharing [PDF]
With continuous advancements in Internet technology and the increased use of cryptographic techniques, the cloud has become the obvious choice for data sharing. Generally, the data are outsourced to cloud storage servers in encrypted form. Access control
Reetu Gupta +8 more
doaj +2 more sources
Multi-authority attribute-based identification scheme
Based on the problem that the existing attribute-based identification scheme is all based on one single authority, which has a key escrow problem, that is, the key generation center knows all users’ private keys, an multi-authority attribute-based ...
Fei TANG +4 more
doaj +3 more sources
A Blockchain-Enabled Multi-Authority Secure IoT Data-Sharing Scheme with Attribute-Based Searchable Encryption for Intelligent Systems [PDF]
With the advancement of technologies such as 5G, digital twins, and edge computing, the Internet of Things (IoT) as a critical component of intelligent systems is profoundly driving the transformation of various industries toward digitalization and ...
Fu Zhang +4 more
doaj +2 more sources
Weighted Attribute-Based Proxy Re-Encryption Scheme with Distributed Multi-Authority Attributes [PDF]
Existing attribute-based proxy re-encryption schemes suffer from issues like complex access policies, large ciphertext storage space consumption, and an excessive authority of the authorization center, leading to weak security and controllability of data
Wenlong Yi +4 more
doaj +2 more sources
Multi-authority ABS supporting dendritic access structure
Attribute-based signature (ABS),which could realize fine-grained access control,was considered to be an important method for anonymous authentication in cloud computing.However,normal ABS only provided simple access control through threshold structure ...
Ruo MO, Jian-feng MA, Xi-meng LIU, Qi LI
doaj +4 more sources
Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage
As is known, attribute-based encryption (ABE) is usually adopted for cloud storage, both for its achievement of fine-grained access control over data, and for its guarantee of data confidentiality.
Yang Ming, Baokang He, Chenhao Wang
doaj +1 more source
Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
Proxy re-encryption allows a proxy to convert a ciphertext related to a certain access policy into another one with a different access policy without uncovering the underlying plaintext, which makes the proxy re-encryption technology to be an important ...
Shang LIU, Yinzhang GUO
doaj +3 more sources
Revocable and Traceable Undeniable Attribute-Based Encryption in Cloud-Enabled E-Health Systems
The emerging cloud storage technology has significantly improved efficiency and productivity in the traditional electronic healthcare field. However, it has also brought about many security concerns.
Zhongxiang He +4 more
doaj +1 more source
Although there are several access control systems in the literature for flexible policy management in multi-authority and multi-domain environments, achieving interoperability and scalability, without relying on strong trust assumptions, is still an open
Vangelis Malamas +4 more
doaj +1 more source
Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing
Fog computing enables computation, storage, applications, and network services between the Internet of Things and the cloud servers by extending the Cloud Computing paradigm to the edge of the network.
Dawei Li +3 more
doaj +1 more source

