Results 151 to 160 of about 4,231 (188)
Some of the next articles are maybe not open access.

Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV

IEEE Transactions on Vehicular Technology, 2020
Edge intelligence is an emerging concept referring to processes in which data are collected and analyzed and insights are delivered close to where the data are captured in a network using a selection of advanced intelligent technologies. As a promising solution to solve the problems of insufficient computing capacity and transmission latency, the edge ...
Chaosheng Feng   +5 more
openaire   +3 more sources

Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain

IEEE Transactions on Information Forensics and Security, 2020
The concept of functional encryption (FE) has been introduced to address the shortcomings of public-key encryption (PKE) in many emerging applications which require both data storage and data sharing (e.g., cloud storage service). One of the major issues existing in most FE schemes is the efficiency, as they are built from bilinear pairings of which ...
Hui Cui   +4 more
openaire   +1 more source

Selective decryption of outsourced IoT data

2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 2015
Outsourcing of IoT-data is a common concept when using third-party services, e.g. an external building management service is given access to the building's sensor measurements. However, the measurements captured from building systems often need to be protected from unauthorized access, because they are linked to persons, processes or business secrets ...
Jens-Matthias Bohli   +2 more
openaire   +1 more source

Offline/online attribute‐based encryption with verifiable outsourced decryption

Concurrency and Computation: Practice and Experience, 2016
SummaryIn this big data era, service providers tend to put the data in a third‐party cloud system. Social networking websites are typical examples. To protect the security and privacy of the data, data should be stored in encrypted form. This brings forth new challenges: how to allow different users to access only the authorized part of the data ...
Jiang, Z   +5 more
openaire   +2 more sources

An Outsourced Decryption ABE Model using ECC in Internet of Things

International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2021
Internet of Things (IoT) is a modern technology that is applicable almost everywhere nowadays. Everything is connected to the Internet in the modern digital era. IoT is a collection of things that are interconnected to share information. Devices connected to IoT networks have some limitations in performing heavy computational tasks because of the ...
Dilip Kumar, Manoj Kumar, Gaurav Gupta
openaire   +2 more sources

Attribute-based encryption with encryption and decryption outsourcing

2014
In this paper we propose a new scheme for ciphertext-policy attribute-based encryption that allows outsourcing of computationally expensive encryption and decryption steps. The scheme constitutes an important building block for mobile applications where both the host and users use mobile devices with limited computational power. In the proposed scheme,
Asim, M., Petkovic, M., Ignatenko, T.
openaire   +2 more sources

Outsourcing Decryption of Attribute Based Encryption with Energy Efficiency

2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2015
In this paper, we propose a new efficient scheme to outsource the the decryption of attribute based encryption with energy efficiency. We observe all the previous work on out-sourcing the decryption of ABE cares little about the ciphertext length. Almost all of them have linear length ciphertext with the attributes or the policy.
Xu An Wang, Jianfeng Ma, Fatos Xhafa
openaire   +1 more source

Attribute-Based Encryption with Publicly Verifiable Outsourced Decryption

2019
Attribute-based encryption (ABE) is a useful cryptographic primitive for access control and fine-grained sharing on encrypted data. However, the main drawback of ABE is that the computational cost grows linearly with the complexity of the access policy. One of the promising solutions for the problem is to outsource computation securely.
Hui Zheng   +6 more
openaire   +1 more source

Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack

2021
Attribute-based encryption (ABE) provides fine-grained access control on encrypted data, but it is not suitable for limited-resource devices due to the inefficiency of decryption. To solve this problem, Green et al. proposed a new paradigm named attribute-based encryption with outsourced decryption (OD-ABE).
Ti Wang   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy