Results 21 to 30 of about 4,231 (188)

Verifiable outsourced attribute-based encryption with access update

open access: yes网络与信息安全学报, 2019
In order to meet the secure and reliable access requirements for the encrypted data stored in the public cloud,a verifiable outsourced attribute-based encryption scheme with access update was proposed.Based on a standard KP-ABE scheme,verifiable ...
Suqing LIN
doaj   +3 more sources

Hierarchical Access Structure-based Scheme with Outsourcing and Revocation Mechanism for Cloud Environment

open access: yesJournal of Telecommunications and Information Technology, 2023
Ciphertext policy attribute-based encryption (CPABE) is one of the efficient implementations of encrypted access control scheme for cloud computing.
Tabassum N. Mujawar   +2 more
doaj   +1 more source

Secure k-Nearest Neighbor Query over Encrypted Data in Outsourced Environments [PDF]

open access: yes, 2013
For the past decade, query processing on relational data has been studied extensively, and many theoretical and practical solutions to query processing have been proposed under various scenarios.
Elmehdwi, Yousef   +2 more
core   +3 more sources

Non-transferable unidirectional proxy re-encryption scheme for secure social cloud storage sharing [PDF]

open access: yes, 2016
(c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works for resale or ...
Hao, Wei   +3 more
core   +1 more source

An Outsourced Attribute-Based Encryption Scheme Supporting Attribute Revocation [PDF]

open access: yesJisuanji gongcheng, 2017
Traditional Ciphertext-Policy Attribute-Based Encryption(CP-ABE) schemes have large computational overhead in key generation,decryption and attribute revocation processes.Aiming at this problem,this paper proposes an outsourced CP-ABE scheme which ...
LIU Zhusong,PENG Jiapeng
doaj   +1 more source

k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data [PDF]

open access: yes, 2014
Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications.
Elmehdwi, Yousef   +2 more
core   +3 more sources

An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network

open access: yesInternational Journal of Distributed Sensor Networks, 2019
Device-to-device communication is considered as one of the hopeful technologies for proximal communication, which plays a vital role in the wireless systems and 5G cellular networks.
Huawei Wang   +3 more
doaj   +1 more source

Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing

open access: yesIEEE Access, 2019
The notion of attribute-based encryption with outsourced decryption (OD-ABE) was proposed by Green, Hohenberger, and Waters. In OD-ABE, the ABE ciphertext is converted to a partially-decrypted ciphertext that has a shorter bit length and a faster ...
Baodong Qin, Dong Zheng
doaj   +1 more source

Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds

open access: yesIEEE Access, 2022
Cloud computing with massive storage and computing capabilities has become widespread in actual applications. It is critical to ensure secure data sharing in cloud-based applications.
Huidan Hu, Zhenfu Cao, Xiaolei Dong
doaj   +1 more source

Verifiable Statistical Analysis Scheme for Encrypted Medical Data in Cloud Storage [PDF]

open access: yesJisuanji gongcheng, 2021
In order to meet the requirements of medical data in cloud for sensitivity, integrity and statistical analysis applicability, this paper proposes a verifiable statistical analysis scheme for encrypted medical data.The scheme employs the homomorphic ...
ZHANG Xiaojun, ZHANG Jingwei, HUANG Chao, TANG Wei
doaj   +1 more source

Home - About - Disclaimer - Privacy