Verifiable outsourced attribute-based encryption with access update
In order to meet the secure and reliable access requirements for the encrypted data stored in the public cloud,a verifiable outsourced attribute-based encryption scheme with access update was proposed.Based on a standard KP-ABE scheme,verifiable ...
Suqing LIN
doaj +3 more sources
Ciphertext policy attribute-based encryption (CPABE) is one of the efficient implementations of encrypted access control scheme for cloud computing.
Tabassum N. Mujawar +2 more
doaj +1 more source
Secure k-Nearest Neighbor Query over Encrypted Data in Outsourced Environments [PDF]
For the past decade, query processing on relational data has been studied extensively, and many theoretical and practical solutions to query processing have been proposed under various scenarios.
Elmehdwi, Yousef +2 more
core +3 more sources
Non-transferable unidirectional proxy re-encryption scheme for secure social cloud storage sharing [PDF]
(c) 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works for resale or ...
Hao, Wei +3 more
core +1 more source
An Outsourced Attribute-Based Encryption Scheme Supporting Attribute Revocation [PDF]
Traditional Ciphertext-Policy Attribute-Based Encryption(CP-ABE) schemes have large computational overhead in key generation,decryption and attribute revocation processes.Aiming at this problem,this paper proposes an outsourced CP-ABE scheme which ...
LIU Zhusong,PENG Jiapeng
doaj +1 more source
k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data [PDF]
Data Mining has wide applications in many areas such as banking, medicine, scientific research and among government agencies. Classification is one of the commonly used tasks in data mining applications.
Elmehdwi, Yousef +2 more
core +3 more sources
An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network
Device-to-device communication is considered as one of the hopeful technologies for proximal communication, which plays a vital role in the wireless systems and 5G cellular networks.
Huawei Wang +3 more
doaj +1 more source
Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing
The notion of attribute-based encryption with outsourced decryption (OD-ABE) was proposed by Green, Hohenberger, and Waters. In OD-ABE, the ABE ciphertext is converted to a partially-decrypted ciphertext that has a shorter bit length and a faster ...
Baodong Qin, Dong Zheng
doaj +1 more source
Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds
Cloud computing with massive storage and computing capabilities has become widespread in actual applications. It is critical to ensure secure data sharing in cloud-based applications.
Huidan Hu, Zhenfu Cao, Xiaolei Dong
doaj +1 more source
Verifiable Statistical Analysis Scheme for Encrypted Medical Data in Cloud Storage [PDF]
In order to meet the requirements of medical data in cloud for sensitivity, integrity and statistical analysis applicability, this paper proposes a verifiable statistical analysis scheme for encrypted medical data.The scheme employs the homomorphic ...
ZHANG Xiaojun, ZHANG Jingwei, HUANG Chao, TANG Wei
doaj +1 more source

