Results 11 to 20 of about 4,231 (188)
Attribute-Based Encryption With Verifiable Outsourced Decryption
Attribute-based encryption (ABE) is a public-key-based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes associated with private keys and ciphertexts.
LAI, Junzuo +3 more
openaire +5 more sources
Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption
Attribute-based encryption (ABE) with outsourced decryption not only enables fine-grained sharing of encrypted data, but also overcomes the efficiency drawback (in terms of ciphertext size and decryption cost) of the standard ABE schemes. In particular, an ABE scheme with outsourced decryption allows a third party (e.g., a cloud server) to transform an
QIN, Baodong +3 more
openaire +5 more sources
Wireless body area network includes some tiny wearable sensors for monitoring the physiological data of user, which has been a promising method of promoting the quality and efficiency greatly in healthcare.
Rui Guo +4 more
doaj +2 more sources
Privacy-Preserving Image Watermark Embedding Method Based on Edge Computing
To solve the problem of privacy leakage and response latency in outsourced image watermark embedding in cloud computing, an efficient and privacy-preserving watermark embedding method for outsourced digital images was proposed by introducing edge ...
Hang Cheng +4 more
doaj +1 more source
Concrete Attribute-Based Encryption Scheme with Verifiable Outsourced Decryption [PDF]
As more sensitive data is shared and stored by third-party sites on the internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data is that it can be selectively shared only at a coarse-grained level. Attribute based encryption is a public-key-based one-to-many encryption that allows users to encrypt and ...
K Dinesh Kumar, D Arun Kumar Reddy
openaire +3 more sources
As for the advancement of IoT and cloud computing in healthcare, outsourcing encrypted Electronic medical records (EMRs) created by the aggregation of medical treatment applications and health data collected from IoT devices enables high accessibility ...
Somchart Fugkeaw, Leon Wirz, Lyhour Hak
doaj +1 more source
Value-driven Security Agreements in Extended Enterprises [PDF]
Today organizations are highly interconnected in business networks called extended enterprises. This is mostly facilitated by outsourcing and by new economic models based on pay-as-you-go billing; all supported by IT-as-a-service.
Franqueira, Virginia Nunes Leal +1 more
core +9 more sources
Verifiable Outsourced Decryption OO-CP-ABE Access Control Scheme with Hidden Policy [PDF]
In Ciphertext-Policy Attribute-Based Encryption(CP-ABE),the time required for data encryption and decryption is related to the complexity of the access structure,so implementing CP-ABE in mobile devices makes the device under greater computational ...
DILXAT Ghopur, CHEN Cheng, NURMAMAT Helil
doaj +1 more source
A practical and secure multi-keyword search method over encrypted cloud data [PDF]
Cloud computing technologies become more and more popular every year, as many organizations tend to outsource their data utilizing robust and fast services of clouds while lowering the cost of hardware ownership.
Kantarcioglu, Murat +5 more
core +1 more source
An Attribute-Based Encryption Method Using Outsourced Decryption and Hierarchical Access Structure
Cloud computing is being rapidly adopted by many organizations from different domains and large amounts of data is stored in the cloud. In order to ensure data security, the attribute-based access control mechanism has been emerging recently as a fine ...
Tabassum N. Mujawar, Lokesh B. Bhajantri
doaj +1 more source

