Articles with "attribute based" as a keyword



Photo by aleexcif from unsplash

Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal of Information Security"

DOI: 10.1007/s10207-017-0388-7

Abstract: Attribute-based encryption (ABE) allows one-to-many encryption with static access control. In many occasions, the access control policy must be updated, but the original encryptor might be unavailable to re-encrypt the message, which makes it impractical.… read more here.

Keywords: policy; access policy; attribute based; access ... See more keywords
Photo from wikipedia

A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems

Sign Up to like & get
recommendations!
Published in 2021 at "Mobile Networks and Applications"

DOI: 10.1007/s11036-018-1102-3

Abstract: Attribute based encryption is suitable for data protection in data outsourcing systems such as cloud computing. However, the leveraging of encryption technique may retrain some routine operations over the encrypted data, particularly in the field… read more here.

Keywords: retrieval; data outsourcing; attribute based; fine grained ... See more keywords
Photo by kellysikkema from unsplash

Comments on “verifiable outsourced attribute-based signature scheme”

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-6725-7

Abstract: Ren and Jiang recently published a “verifiable outsourced attribute-based signature scheme” in Multimedia Tools and Applications. In this note, we first provide two attacks on the verifiability of the semi-signatures of this scheme by showing… read more here.

Keywords: based signature; signature scheme; outsourced attribute; verifiable outsourced ... See more keywords
Photo from wikipedia

Efficient access control with traceability and user revocation in IoT

Sign Up to like & get
recommendations!
Published in 2021 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-021-11286-0

Abstract: With the universality and availability of Internet of Things (IoT), data privacy protection in IoT has become a hot issue. As a branch of attribute-based encryption (ABE), ciphertext policy attribute-based encryption (CP-ABE) is widely used… read more here.

Keywords: traceability; iot; scheme; attribute based ... See more keywords
Photo by lucabravo from unsplash

MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-020-01710-y

Abstract: The development of Electronic Information Technology has made the Electronic Medical Record a commonly used approach to recording and categorizing medical patient data in databases of different hospitals and medical entities so that controlling the… read more here.

Keywords: scheme; attribute based; technology; medical data ... See more keywords
Photo from wikipedia

E health care data privacy preserving efficient file retrieval from the cloud service provider using attribute based file encryption

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-020-01911-5

Abstract: File storing and retrieving is performed in the robust as well as secure manner by using the cloud computing technology. Various researchers have developed numerous mechanisms via attribute based encryption for the health care applications.… read more here.

Keywords: computation; attribute; cloud; attribute based ... See more keywords
Photo from wikipedia

A survey on multi-authority and decentralized attribute-based encryption

Sign Up to like & get
recommendations!
Published in 2022 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-021-02915-5

Abstract: The introduction of attribute-based encryption (ABE) targets to achieve the implementation of single-to-numerous encryption; however, the sole authority challenge and the issue of distributed management of attributes are bottlenecks to its realization. Multi-authority attribute-based encryption… read more here.

Keywords: authority; attribute based; attribute; survey ... See more keywords
Photo by campaign_creators from unsplash

A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment.

Sign Up to like & get
recommendations!
Published in 2022 at "Big data"

DOI: 10.1089/big.2021.0301

Abstract: Owing to the huge volume of big data, users generally use the cloud to store big data. However, because the data are out of the control of users, sensitive data need to be protected. The… read more here.

Keywords: big data; attribute based; encryption; encryption scheme ... See more keywords
Photo by anniespratt from unsplash

An Attribute-Based Encryption Scheme to Secure Fog Communications

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Access"

DOI: 10.1109/access.2017.2705076

Abstract: Fog computing is deemed as a highly virtualized paradigm that can enable computing at the Internet of Things devices, residing in the edge of the network, for the purpose of delivering services and applications more… read more here.

Keywords: encryption scheme; fog; attribute based; based encryption ... See more keywords
Photo by drew_hays from unsplash

Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Access"

DOI: 10.1109/access.2017.2756070

Abstract: The privacy of users must be considered as the utmost priority in distributed networks. To protect the identities of users, attribute-based encryption (ABE) was presented by Sahai et al. ABE has been widely used in… read more here.

Keywords: equality test; attribute based; based encryption; test ... See more keywords
Photo by kellysikkema from unsplash

Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2801266

Abstract: Electronic Health Records (EHRs) are entirely controlled by hospitals instead of patients, which complicates seeking medical advices from different hospitals. Patients face a critical need to focus on the details of their own healthcare and… read more here.

Keywords: signature scheme; attribute based; multiple authorities; based signature ... See more keywords