Results 161 to 170 of about 4,231 (188)
Some of the next articles are maybe not open access.

Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption

2016
Although attribute-based encryption ABE is a useful cryptographic tool to realize expressive access policy on ciphertexts, it is not quite suitable for mobile devices. The root cause lies in that the size of the ciphertext and the decryption cost are usually proportional to the complexity of the access policy.
Cong Zuo   +4 more
openaire   +1 more source

Flexible Authorization by Generating Public Re-decryption Trapdoor in Outsourced Scenarios

2011 IEEE 4th International Conference on Cloud Computing, 2011
With the rapid application of service-oriented technologies, service and data outsourcing has become a practical and useful computing paradigm. Combined use of access control and cryptography was proposed by many researchers to protect sensitive information in this outsourcing scenario.
Yang Zhang, Jun-Liang Chen
openaire   +1 more source

A BGN Type Outsourcing the Decryption of CP-ABE Ciphertexts

2017
Cloud computing security is the key bottleneck that restricts its development, and access control on the result of cloud computing is a hot spot of current research. Based on the somewhat homomorphic encryption BGN and combined with Green’s scheme that proposed outsourcing the decryption of CP-ABE (Ciphertext-Policy Attribute-Based Encryption ...
Li Zhenlin   +3 more
openaire   +1 more source

Requester-Centric CP-ABE Combining Removing Escrow and Outsourcing Decryption

2019
Key escrow and low efficiency are two practical bottlenecks of attribute-based encryption. In this paper, a Requester-Centric CP-ABE (RC-CP-ABE) combining removing escrow and outsourcing decryption is proposed. By the bilinear map of composite order, we optimized the computational complexity of key transformation in the case of a large number of ...
Wang Yao, Faguo Wu, Xiao Zhang
openaire   +1 more source

Blockchain-Based CP-ABE with Publicly Verifiable Outsourced Decryption in IoT

2020
Attribute based encryption (ABE) was used to ensure confidentiality and access control in IoT as a preeminent cryptographic primitive. However, the traditional ABE with outsourced decryption cannot achieve public verifiability for decryption results. In this paper, blockchain technology is appplied to realize the publicly verifiability in our CP-ABE ...
Mande Xie, Jifei Hu, Haibo Hong
openaire   +1 more source

Blockchain-Based Fair Payment for ABE with Outsourced Decryption

Peer-to-Peer Networking and Applications, 2022
Linjian Hong   +3 more
openaire   +1 more source

Attribute-based Verifiable Outsourcing Decryption Encryption Scheme in IIoT

2023 International Conference on Networking and Network Applications (NaNA), 2023
Yang Li   +5 more
openaire   +1 more source

POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts

2015
Attribute-based encryption (ABE) allows user to encrypt and decrypt data based on user attributes, and can be applied in some promising area such as mobile cloud storage. Since these are massive users in these applications, secure online transmission of decryption key is necessary.
Yuejian Fang   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy