Results 21 to 30 of about 83,666 (156)
Multi-authority attribute-based encryption with efficient user revocation in cloud computing
An efficient user revocable multi-authority ABE scheme was proposed,a “hybrid decryption key” for each user isused to achieve efficient user revocation.Comparing with the existing schemes,this scheme is more effective in user revocation.In addition,the ...
Liang-xuan ZHANG,Hui LI
doaj +1 more source
Nowadays, secure data access control has become one of the major concerns in a cloud storage system. As a logical combination of attribute-based encryption and attribute-based signature, attribute-based signcryption (ABSC) can provide confidentiality and
Qian Xu +5 more
doaj +1 more source
The Dilemma Between Fiscal Decentralization and Budget Balance
This paper explores the effects of the distribution of fiscal authority for fiscal decentralization on the U.S. state budget balance. Numerous scholars have pointed out that fiscal institutions play an important role in achieving budget balance, but ...
Jongmin Shon
doaj +1 more source
Multi-authority Attribute-based Encryption Scheme with Policy Hiding [PDF]
Most existing attribute-based encryption schemes of hidden policies are directed to a single authority,without taking into account the situation where the users’ attributes are managed by multi-authority,having the problems such as low-efficient of key ...
FAN Yundong,WU Xiaoping
doaj +1 more source
Multi-Authority Secret-Ballot Elections with Linear Work [PDF]
We present new cryptographic protocols for multi-authority secret ballot elections that guarantee privacy, robustness, and univer- sal verifiability. Application of some novel techniques, in particular the construction of witness hiding/indistinguishable protocols from Cramer, Damgård and Schoenmakers, and the verifiable secret sharing scheme of ...
Cramer, R. +3 more
openaire +2 more sources
In 2018, Yang et al. proposed a decentralized multi-authority attribute-based encryption scheme for cloud computing applications and proved its security using the dual system encryption technique. In this comment, we show that Yang et al.’s scheme
Syh-Yuan Tan
doaj +1 more source
Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall
The revelations of Snowden show that hardware and software of devices may corrupt users' machine to compromise the security in various ways. To address this concern, Mironov and Stephen-Davidowitz introduce the Cryptographic Reverse Firewall (CRF ...
Bo Hong +3 more
doaj +1 more source
Multi-authority Attribute Based Encryption [PDF]
In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in which each user is identified by a set of attributes, and some function of those attributes is used to determine decryption ability for each ciphertext. Sahai and Waters introduced a single
openaire +1 more source
Attribute-based encryption (ABE) is used for achieving data confidentiality and access control in cloud environments. Most often ABE schemes are constructed using bilinear pairing which has a higher computational complexity, making algorithms inefficient
Balaji Chandrasekaran +1 more
doaj +1 more source
In many universities, students’ physical ability data are collected and stored in the cloud through various sensing devices to save computational and storage costs.
You Zhao, Ye Fan, Xuefen Bian
doaj +1 more source

