Results 21 to 30 of about 83,666 (156)

Multi-authority attribute-based encryption with efficient user revocation in cloud computing

open access: yes网络与信息安全学报, 2016
An efficient user revocable multi-authority ABE scheme was proposed,a “hybrid decryption key” for each user isused to achieve efficient user revocation.Comparing with the existing schemes,this scheme is more effective in user revocation.In addition,the ...
Liang-xuan ZHANG,Hui LI
doaj   +1 more source

Secure Multi-Authority Data Access Control Scheme in Cloud Storage System Based on Attribute-Based Signcryption

open access: yesIEEE Access, 2018
Nowadays, secure data access control has become one of the major concerns in a cloud storage system. As a logical combination of attribute-based encryption and attribute-based signature, attribute-based signcryption (ABSC) can provide confidentiality and
Qian Xu   +5 more
doaj   +1 more source

The Dilemma Between Fiscal Decentralization and Budget Balance

open access: yesTransylvanian Review of Administrative Sciences, 2022
This paper explores the effects of the distribution of fiscal authority for fiscal decentralization on the U.S. state budget balance. Numerous scholars have pointed out that fiscal institutions play an important role in achieving budget balance, but ...
Jongmin Shon
doaj   +1 more source

Multi-authority Attribute-based Encryption Scheme with Policy Hiding [PDF]

open access: yesJisuanji gongcheng, 2018
Most existing attribute-based encryption schemes of hidden policies are directed to a single authority,without taking into account the situation where the users’ attributes are managed by multi-authority,having the problems such as low-efficient of key ...
FAN Yundong,WU Xiaoping
doaj   +1 more source

Multi-Authority Secret-Ballot Elections with Linear Work [PDF]

open access: yes, 1996
We present new cryptographic protocols for multi-authority secret ballot elections that guarantee privacy, robustness, and univer- sal verifiability. Application of some novel techniques, in particular the construction of witness hiding/indistinguishable protocols from Cramer, Damgård and Schoenmakers, and the verifiable secret sharing scheme of ...
Cramer, R.   +3 more
openaire   +2 more sources

Correction to “Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing”

open access: yesIEEE Access, 2019
In 2018, Yang et al. proposed a decentralized multi-authority attribute-based encryption scheme for cloud computing applications and proved its security using the dual system encryption technique. In this comment, we show that Yang et al.’s scheme
Syh-Yuan Tan
doaj   +1 more source

Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall

open access: yesIEEE Access, 2019
The revelations of Snowden show that hardware and software of devices may corrupt users' machine to compromise the security in various ways. To address this concern, Mironov and Stephen-Davidowitz introduce the Cryptographic Reverse Firewall (CRF ...
Bo Hong   +3 more
doaj   +1 more source

Multi-authority Attribute Based Encryption [PDF]

open access: yes, 2007
In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in which each user is identified by a set of attributes, and some function of those attributes is used to determine decryption ability for each ciphertext. Sahai and Waters introduced a single
openaire   +1 more source

An Efficient Tate Pairing Algorithm for a Decentralized Key-Policy Attribute Based Encryption Scheme in Cloud Environments

open access: yesCryptography, 2018
Attribute-based encryption (ABE) is used for achieving data confidentiality and access control in cloud environments. Most often ABE schemes are constructed using bilinear pairing which has a higher computational complexity, making algorithms inefficient
Balaji Chandrasekaran   +1 more
doaj   +1 more source

OO-MA-KP-ABE-CRF: Online/Offline Multi-Authority Key-Policy Attribute-Based Encryption with Cryptographic Reverse Firewall for Physical Ability Data

open access: yesMathematics, 2023
In many universities, students’ physical ability data are collected and stored in the cloud through various sensing devices to save computational and storage costs.
You Zhao, Ye Fan, Xuefen Bian
doaj   +1 more source

Home - About - Disclaimer - Privacy