Biometric based Multi-Authority Inner Product Encryption for Electronic Health Record [PDF]
INTRODUCTION: Attribute-based encryption enhances the security of electronic health records outsourced to the cloud. At thesame time, single authority attribute based encryption leads to user privacy breech and attribute management complexity.Multi ...
C. Exceline, Jasmine Norman
doaj +1 more source
CP-ABE Scheme with Attribute Revocation Under Environment of Multi-attribute Authority [PDF]
For the attribute-based encryption scheme,a single authority has the problem of low efficiency and easy disclosure of user keys.Through the establishment of a decentralized attribute authority and agent reencryption technology,a Ciphertext-policy ...
ZHANG Yulei,LIU Wenjing,MA Yanli,WANG Caifen
doaj +1 more source
Multi-authority attribute-based encryption with efficient revocation
Multi-authority attribute-based encryption was very suitable for data access control in a cloud storage environment.However,efficient user revocation in multi-authority attribute-based encryption remains a challenging problem that prevents it from ...
Kai ZHANG +4 more
doaj +2 more sources
How to manage a multi-author megapaper [PDF]
Large teams can produce more impactful work, but organizing a paper produced by many can be a major challenge. Large teams can produce more impactful work, but organizing a paper produced by many can be a major challenge.
openaire +1 more source
Multi-authority attribute-based encryption scheme with policy dynamic updating
Attribute-based encryption (ABE) is a new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud environment.However,a key limitation remains,namely policy updating.Thus,a multi-authority attribute ...
Xi-xi YAN +3 more
doaj +2 more sources
Cloud Access Control Scheme Supporting Multi-authority Centers and Attribute Change [PDF]
The traditional Ciphertextpolicy Attribute-based Encryption(CP-ABE) systems are based on singleauthority organization,and most of them have the problems of large computation cost,low key maintenance efficiency,and inability to achieve anti-conspiracy ...
YANG Xiaodong,AN Faying,YANG Miaomiao,YANG Ping,WANG Caifen
doaj +1 more source
Efficient revocable attribute-based encryption scheme
In the existing solutions,the time-based scheme is difficult to achieve immediate revocation,and the third-party-based scheme often requires re-encryption,which needs large amount of calculation and doesn’t apply to mas-sive data.To solve the problem,an ...
Xuejun LI, Dan ZHANG, Hui LI
doaj
Fine-grained access control scheme with user privacy protection in cloud storage systems
Based on the actual demands of cloud storage system,a new multi-authority ABE (MA-ABE) scheme is constructed to support user privacy protection and attribute revocation.For enhancing efficiency and alleviatingowner’s computing load,the complex computing ...
Min XIAO, Chun-lei WANG, You-sheng ZHOU
doaj
Multi-authority attribute-based encryption access control model for cloud storage
The existing attribute-based encryption access control studies are mostly based on single authority,and this scheme is apt to be under attack to cause exposure of secret keys.Thus,a multi-authority access control model PRM-CSAC is proposed.Based on CP ...
Zhi-tao GUAN +3 more
doaj +2 more sources
Multi-authority attribute-based access control system in mHealth with traceability
Mobile healthcare (mHealth) is an emerging technology which facilitates the share of personal health records (PHR),however,it also brings the risk of the security and privacy of PHR.Attribute-based encryption (ABE) is regarded as a new cryptology to ...
Qi LI, Hongbo ZHU, Jinbo XIONG, Ruo MO
doaj +2 more sources

