Results 31 to 40 of about 83,666 (156)

Biometric based Multi-Authority Inner Product Encryption for Electronic Health Record [PDF]

open access: yesEAI Endorsed Transactions on Pervasive Health and Technology, 2020
INTRODUCTION: Attribute-based encryption enhances the security of electronic health records outsourced to the cloud. At thesame time, single authority attribute based encryption leads to user privacy breech and attribute management complexity.Multi ...
C. Exceline, Jasmine Norman
doaj   +1 more source

CP-ABE Scheme with Attribute Revocation Under Environment of Multi-attribute Authority [PDF]

open access: yesJisuanji gongcheng, 2018
For the attribute-based encryption scheme,a single authority has the problem of low efficiency and easy disclosure of user keys.Through the establishment of a decentralized attribute authority and agent reencryption technology,a Ciphertext-policy ...
ZHANG Yulei,LIU Wenjing,MA Yanli,WANG Caifen
doaj   +1 more source

Multi-authority attribute-based encryption with efficient revocation

open access: yesTongxin xuebao, 2017
Multi-authority attribute-based encryption was very suitable for data access control in a cloud storage environment.However,efficient user revocation in multi-authority attribute-based encryption remains a challenging problem that prevents it from ...
Kai ZHANG   +4 more
doaj   +2 more sources

How to manage a multi-author megapaper [PDF]

open access: yesNature, 2019
Large teams can produce more impactful work, but organizing a paper produced by many can be a major challenge. Large teams can produce more impactful work, but organizing a paper produced by many can be a major challenge.
openaire   +1 more source

Multi-authority attribute-based encryption scheme with policy dynamic updating

open access: yesTongxin xuebao, 2017
Attribute-based encryption (ABE) is a new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud environment.However,a key limitation remains,namely policy updating.Thus,a multi-authority attribute ...
Xi-xi YAN   +3 more
doaj   +2 more sources

Cloud Access Control Scheme Supporting Multi-authority Centers and Attribute Change [PDF]

open access: yesJisuanji gongcheng, 2018
The traditional Ciphertextpolicy Attribute-based Encryption(CP-ABE) systems are based on singleauthority organization,and most of them have the problems of large computation cost,low key maintenance efficiency,and inability to achieve anti-conspiracy ...
YANG Xiaodong,AN Faying,YANG Miaomiao,YANG Ping,WANG Caifen
doaj   +1 more source

Efficient revocable attribute-based encryption scheme

open access: yesTongxin xuebao, 2019
In the existing solutions,the time-based scheme is difficult to achieve immediate revocation,and the third-party-based scheme often requires re-encryption,which needs large amount of calculation and doesn’t apply to mas-sive data.To solve the problem,an ...
Xuejun LI, Dan ZHANG, Hui LI
doaj  

Fine-grained access control scheme with user privacy protection in cloud storage systems

open access: yesTongxin xuebao, 2014
Based on the actual demands of cloud storage system,a new multi-authority ABE (MA-ABE) scheme is constructed to support user privacy protection and attribute revocation.For enhancing efficiency and alleviatingowner’s computing load,the complex computing ...
Min XIAO, Chun-lei WANG, You-sheng ZHOU
doaj  

Multi-authority attribute-based encryption access control model for cloud storage

open access: yesTongxin xuebao, 2015
The existing attribute-based encryption access control studies are mostly based on single authority,and this scheme is apt to be under attack to cause exposure of secret keys.Thus,a multi-authority access control model PRM-CSAC is proposed.Based on CP ...
Zhi-tao GUAN   +3 more
doaj   +2 more sources

Multi-authority attribute-based access control system in mHealth with traceability

open access: yesTongxin xuebao, 2018
Mobile healthcare (mHealth) is an emerging technology which facilitates the share of personal health records (PHR),however,it also brings the risk of the security and privacy of PHR.Attribute-based encryption (ABE) is regarded as a new cryptology to ...
Qi LI, Hongbo ZHU, Jinbo XIONG, Ruo MO
doaj   +2 more sources

Home - About - Disclaimer - Privacy