Results 91 to 100 of about 4,231 (188)
Attribute-Based Equality Test Over Encrypted Data Without Random Oracles
Sensitive data would be encrypted before uploading to the cloud due to the privacy issue. However, how to compare the encrypted data efficiently becomes a problem.
Yuanhao Wang +5 more
doaj +1 more source
CP-ABE scheme supporting partially hidden access policy
Most of the existing ciphertext-policy attribute-based encryption (CP-ABE) schemes that support outsourced decryption do not consider the privacy protection of the ciphertext access policy, while some schemes that support policy hidden have the problem ...
LIU Xia +6 more
doaj
Generic Construction of Outsourced Attribute-Based Encryption Without Key Escrow
Attribute-based encryption (ABE) has a broad developing prospect in fine-grained sharing of ciphertext in the background of cloud computing. However, most of ABE schemes have a potential security risk called key escrow problem because users’ ...
Yang Chen +4 more
doaj +1 more source
Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks
The concept of Internet of Things (IoT) has raised in the cloud computing paradigm as it adds latency when migrating all pieces of data from the network edge to the data center for them to be approached.
Hui Cui, Xun Yi, Surya Nepal
doaj +1 more source
Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage
Attribute-based encryption (ABE) is suitable for mobile cloud storage to protect data confidentiality and realize fine-grained data access control.
Shangping Wang +3 more
doaj +1 more source
Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism
The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a ...
Kuan LIU +4 more
openaire +2 more sources
As UWSN have received attention, a need for an efficient and secure communication protocol has arisen to overcome the low device performance, node failure, and high propagation latency.
Donghyun Yu, Sinwoong Yun, Jemin Lee
doaj +1 more source
Provenance-based Auditing of Private Data Use
Across the world, organizations are required to comply with regulatory frameworks dictating how to manage personal information. Despite these, several cases of data leaks and exposition of private data to unauthorized recipients have been publicly and ...
Aldeco Perez, Rocio, Moreau, Luc
core
Rainbow: reliable personally identifiable information retrieval across multi-cloud. [PDF]
Song Z, Ma H, Sun S, Xin Y, Zhang R.
europepmc +1 more source
A trusted medical data sharing framework for edge computing leveraging blockchain and outsourced computation. [PDF]
Quan G +6 more
europepmc +1 more source

