A dynamic authorizable ciphertext image retrieval algorithm based on security neural network inference. [PDF]
Zhang XY, Hong JW.
europepmc +1 more source
Identity-based controlled delegated outsourcing data integrity auditing scheme. [PDF]
Du J, Dong G, Ning J, Xu Z, Yang R.
europepmc +1 more source
Outsourcing decryption algorithm of Verifiable transformed ciphertext for data sharing
openaire +1 more source
A Secure Data Sharing Model Utilizing Attribute-Based Signcryption in Blockchain Technology. [PDF]
Song C, Chen L, Wu X, Li Y.
europepmc +1 more source
Research on encrypted malicious traffic detection in power information interaction: application of the electricity multi-granularity flow representation learning approach. [PDF]
Wu Z +5 more
europepmc +1 more source
Related searches:
Full Verifiability for Outsourced Decryption in Attribute Based Encryption
IEEE Transactions on Services Computing, 2020Attribute based encryption (ABE) is a popular cryptographic technology to protect the security of users’ data. However, the decryption cost and ciphertext size restrict the application of ABE in practice. For most existing ABE schemes, the decryption cost and ciphertext size grow linearly with the complexity of access structure.
Jiguo Li +3 more
openaire +3 more sources
Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption
IEEE Transactions on Information Forensics and Security, 2015Attribute-based encryption (ABE) is a promising technique for fine-grained access control of encrypted data in a cloud storage, however, decryption involved in the ABEs is usually too expensive for resource-constrained front-end users, which greatly hinders its practical popularity.
S. Lin, R. Zhang, H. Ma, M. Wang
openaire +3 more sources
CCA-secure ABE with outsourced decryption for fog computing
Future Generation Computer Systems, 2018Fog computing is not a replacement but an extension of cloud computing for the prevalence of the Internet of Things (IoT) applications. In particular, fog computing inserts a middle layer named fog into the infrastructure of cloud computing to obtain the low latency, mobility and location-awareness.
Cong Zuo +4 more
openaire +3 more sources
Attribute-based encryption with outsourced decryption in blockchain
Peer-to-Peer Networking and Applications, 2020Attribute-based encryption (ABE) is a powerful cryptographic primitive for access control and fine-grained sharing on encrypted data. Due to this functionality, ABE is usually adopted in encrypted cloud storage for flexible data sharing. However, the main drawback of ABE is that the computational cost grows linearly with the complexity of the access ...
Hui Zheng, Jun Shao, Guiyi Wei
openaire +3 more sources

