Results 161 to 170 of about 4,231 (188)
Some of the next articles are maybe not open access.
Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption
2016Although attribute-based encryption ABE is a useful cryptographic tool to realize expressive access policy on ciphertexts, it is not quite suitable for mobile devices. The root cause lies in that the size of the ciphertext and the decryption cost are usually proportional to the complexity of the access policy.
Cong Zuo +4 more
openaire +1 more source
Flexible Authorization by Generating Public Re-decryption Trapdoor in Outsourced Scenarios
2011 IEEE 4th International Conference on Cloud Computing, 2011With the rapid application of service-oriented technologies, service and data outsourcing has become a practical and useful computing paradigm. Combined use of access control and cryptography was proposed by many researchers to protect sensitive information in this outsourcing scenario.
Yang Zhang, Jun-Liang Chen
openaire +1 more source
A BGN Type Outsourcing the Decryption of CP-ABE Ciphertexts
2017Cloud computing security is the key bottleneck that restricts its development, and access control on the result of cloud computing is a hot spot of current research. Based on the somewhat homomorphic encryption BGN and combined with Green’s scheme that proposed outsourcing the decryption of CP-ABE (Ciphertext-Policy Attribute-Based Encryption ...
Li Zhenlin +3 more
openaire +1 more source
Requester-Centric CP-ABE Combining Removing Escrow and Outsourcing Decryption
2019Key escrow and low efficiency are two practical bottlenecks of attribute-based encryption. In this paper, a Requester-Centric CP-ABE (RC-CP-ABE) combining removing escrow and outsourcing decryption is proposed. By the bilinear map of composite order, we optimized the computational complexity of key transformation in the case of a large number of ...
Wang Yao, Faguo Wu, Xiao Zhang
openaire +1 more source
Blockchain-Based CP-ABE with Publicly Verifiable Outsourced Decryption in IoT
2020Attribute based encryption (ABE) was used to ensure confidentiality and access control in IoT as a preeminent cryptographic primitive. However, the traditional ABE with outsourced decryption cannot achieve public verifiability for decryption results. In this paper, blockchain technology is appplied to realize the publicly verifiability in our CP-ABE ...
Mande Xie, Jifei Hu, Haibo Hong
openaire +1 more source
Blockchain-Based Fair Payment for ABE with Outsourced Decryption
Peer-to-Peer Networking and Applications, 2022Linjian Hong +3 more
openaire +1 more source
Secured ABE Systems with Verifiable Outsourced Decryption
neuroquantology, 2023openaire +1 more source
Attribute-based Verifiable Outsourcing Decryption Encryption Scheme in IIoT
2023 International Conference on Networking and Network Applications (NaNA), 2023Yang Li +5 more
openaire +1 more source
2015
Attribute-based encryption (ABE) allows user to encrypt and decrypt data based on user attributes, and can be applied in some promising area such as mobile cloud storage. Since these are massive users in these applications, secure online transmission of decryption key is necessary.
Yuejian Fang +4 more
openaire +1 more source
Attribute-based encryption (ABE) allows user to encrypt and decrypt data based on user attributes, and can be applied in some promising area such as mobile cloud storage. Since these are massive users in these applications, secure online transmission of decryption key is necessary.
Yuejian Fang +4 more
openaire +1 more source
Payable Outsourced Decryption for Functional Encryption Using BlockChain
2023R. Sendhil, S. Asifa, A. Savitha Sree
openaire +1 more source

