Results 91 to 100 of about 4,231 (188)

Attribute-Based Equality Test Over Encrypted Data Without Random Oracles

open access: yesIEEE Access, 2020
Sensitive data would be encrypted before uploading to the cloud due to the privacy issue. However, how to compare the encrypted data efficiently becomes a problem.
Yuanhao Wang   +5 more
doaj   +1 more source

CP-ABE scheme supporting partially hidden access policy

open access: yesTongxin xuebao
Most of the existing ciphertext-policy attribute-based encryption (CP-ABE) schemes that support outsourced decryption do not consider the privacy protection of the ciphertext access policy, while some schemes that support policy hidden have the problem ...
LIU Xia   +6 more
doaj  

Generic Construction of Outsourced Attribute-Based Encryption Without Key Escrow

open access: yesIEEE Access, 2018
Attribute-based encryption (ABE) has a broad developing prospect in fine-grained sharing of ciphertext in the background of cloud computing. However, most of ABE schemes have a potential security risk called key escrow problem because users’ ...
Yang Chen   +4 more
doaj   +1 more source

Achieving Scalable Access Control Over Encrypted Data for Edge Computing Networks

open access: yesIEEE Access, 2018
The concept of Internet of Things (IoT) has raised in the cloud computing paradigm as it adds latency when migrating all pieces of data from the network edge to the data center for them to be approached.
Hui Cui, Xun Yi, Surya Nepal
doaj   +1 more source

Efficiently Revocable and Searchable Attribute-Based Encryption Scheme for Mobile Cloud Storage

open access: yesIEEE Access, 2018
Attribute-based encryption (ABE) is suitable for mobile cloud storage to protect data confidentiality and realize fine-grained data access control.
Shangping Wang   +3 more
doaj   +1 more source

Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mechanism

open access: yesTongxin xuebao, 2023
The decryption operation of SM9-HIBE key encapsulation mechanism required two bilinear pairing operations, for the equipment requiring frequent decryption of massive data and with limited computing resources, such resourcing-consuming pairing operation will become an important bottleneck restricting the system deployment.To address the above issue, a ...
Kuan LIU   +4 more
openaire   +2 more sources

Secure and efficient communications with fine-grained access control in underwater wireless sensor networks

open access: yesICT Express
As UWSN have received attention, a need for an efficient and secure communication protocol has arisen to overcome the low device performance, node failure, and high propagation latency.
Donghyun Yu, Sinwoong Yun, Jemin Lee
doaj   +1 more source

Provenance-based Auditing of Private Data Use

open access: yes
Across the world, organizations are required to comply with regulatory frameworks dictating how to manage personal information. Despite these, several cases of data leaks and exposition of private data to unauthorized recipients have been publicly and ...
Aldeco Perez, Rocio, Moreau, Luc
core  

Rainbow: reliable personally identifiable information retrieval across multi-cloud. [PDF]

open access: yesCybersecur (Singap), 2023
Song Z, Ma H, Sun S, Xin Y, Zhang R.
europepmc   +1 more source

Home - About - Disclaimer - Privacy