Results 171 to 180 of about 4,231 (188)
Some of the next articles are maybe not open access.
Outsourcing decryption of KP-ABE using elliptic curve cryptography
International Journal of Information and Computer Security, 2022Dilip Kumar, Manoj Kumar
openaire +1 more source
Outsourcing the Decryption of Ciphertexts for Predicate Encryption via Pallier Paradigm
2017With the proliferation of computation and storage outsourcing, access control has become one of the vital problems in cloud computing. Supporting more complex and flexible function, predicate encryption (PE) is gaining more and more attention in access control of decryption outsourcing.
Bai Ping +3 more
openaire +1 more source
A Mobile Cloud-based Access Control with Efficiently Outsourced Decryption
2022 10th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2022Pattavee Sanchol +2 more
openaire +1 more source
Attribute-Based Encryption with Offline Computation and Outsourced Decryption
2021openaire +1 more source
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT
2021 18th International ISC Conference on Information Security and Cryptology (ISCISC), 2021Abdollahi, Sina +2 more
openaire +1 more source
Decentralized Attribute-Based Access Control with Attribute Revocation and Outsourced Decryption
2023 15th International Conference on Computer Research and Development (ICCRD), 2023Feng Yang, Hui Cui, Jiwu Jing
openaire +1 more source
Offline/Online Attribute-Based Proxy Re-Encryption with Verifiable Outsourced Decryption
Advances in Applied Mathematics, 2021openaire +1 more source
Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
Science China Information Sciences, 2016Kai Zhang +3 more
openaire +1 more source

