Results 1 to 10 of about 4,231 (188)
Analysis of an ABE Scheme with Verifiable Outsourced Decryption [PDF]
Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users’ data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables ...
Yongjian Liao +4 more
doaj +7 more sources
An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption [PDF]
Attribute-based encryption (ABE) is a promising cryptographic tool for data owner (DO) to realize fine-grained date sharing in the cloud computing. In the encryption of most existing ABE schemes, a substantial number of modular exponentiations are often ...
Zhidan Li +4 more
doaj +4 more sources
EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy [PDF]
As medical data become increasingly important in healthcare, it is crucial to have proper access control mechanisms, ensuring that sensitive data are only accessible to authorized users while maintaining privacy and security.
Haobin Ma +3 more
doaj +2 more sources
Robust Access Control for Secure IoT Outsourcing with Leakage Resilience [PDF]
The Internet of Things (IoT) has revolutionized various industries by enabling seamless connectivity and data exchange among devices. However, the security and privacy of outsourced IoT data remain critical challenges, especially given the resource ...
Khaled Riad
doaj +2 more sources
To reduce a user's decryption cost and protect the private information from being leaked, Green et al. proposed an approach outsourcing the decryption of the attribute based encryption (ABE) scheme to the cloud server.
Yongjian Liao +2 more
doaj +3 more sources
Resilient and verifiable outsourced attribute-based non-interactive oblivious transfer protocol for tactical edge networks [PDF]
Tactical Edge Networks (TENs) serve as critical infrastructure for disseminating time-sensitive intelligence under resource-constrained and hostile conditions such as Network-Centric Warfare (NCW) and the Internet of Battlefield Things (IoBT), where ...
Weiwei Liu, Binghao Fu, Lulin Wang
doaj +2 more sources
Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT [PDF]
Devices in the Internet of Things (IoT) usually use cloud storage and cloud computing to save storage and computing cost. Therefore, the efficient realization of one-to-many communication of data on the premise of ensuring the security of cloud storage ...
Juyan Li, Ye Fan, Xuefen Bian, Qi Yuan
doaj +2 more sources
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
Verifying Outsourced Decryption of CP-ABE with Signature [PDF]
Attribute-based encryption enables users to encrypt and decrypt messages based on user attributes. The computational complexities of decryption are very high. By Outsourcing decryption to the third party, it can address the problem. But the verifiability of results returned from the third party has yet to be addressed. In this paper, we introduce short
Peng Zhang, Xueyuan Wang, Hongwei Liu
openaire +1 more source
Outsourced Encryption and Decryption CP-ABE Scheme with User Revocation [PDF]
In order to reduce the computational costs of Attribute-based Encryption(ABE) scheme,this paper proposes an outsourced encryption and decryption Ciphertext-policy ABE(CP-ABE) scheme with user revocation.It delegates the complex computation of the ...
FANG Xuefeng,WANG Xiaoming
doaj +1 more source

