Sign Up to like & get
recommendations!
0
Published in 2017 at "International Journal of Information Security"
DOI: 10.1007/s10207-017-0388-7
Abstract: Attribute-based encryption (ABE) allows one-to-many encryption with static access control. In many occasions, the access control policy must be updated, but the original encryptor might be unavailable to re-encrypt the message, which makes it impractical.…
read more here.
Keywords:
policy;
access policy;
attribute based;
access ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "Mobile Networks and Applications"
DOI: 10.1007/s11036-018-1102-3
Abstract: Attribute based encryption is suitable for data protection in data outsourcing systems such as cloud computing. However, the leveraging of encryption technique may retrain some routine operations over the encrypted data, particularly in the field…
read more here.
Keywords:
retrieval;
data outsourcing;
attribute based;
fine grained ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-6725-7
Abstract: Ren and Jiang recently published a “verifiable outsourced attribute-based signature scheme” in Multimedia Tools and Applications. In this note, we first provide two attacks on the verifiability of the semi-signatures of this scheme by showing…
read more here.
Keywords:
based signature;
signature scheme;
outsourced attribute;
verifiable outsourced ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-021-11286-0
Abstract: With the universality and availability of Internet of Things (IoT), data privacy protection in IoT has become a hot issue. As a branch of attribute-based encryption (ABE), ciphertext policy attribute-based encryption (CP-ABE) is widely used…
read more here.
Keywords:
traceability;
iot;
scheme;
attribute based ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-020-01710-y
Abstract: The development of Electronic Information Technology has made the Electronic Medical Record a commonly used approach to recording and categorizing medical patient data in databases of different hospitals and medical entities so that controlling the…
read more here.
Keywords:
scheme;
attribute based;
technology;
medical data ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-020-01911-5
Abstract: File storing and retrieving is performed in the robust as well as secure manner by using the cloud computing technology. Various researchers have developed numerous mechanisms via attribute based encryption for the health care applications.…
read more here.
Keywords:
computation;
attribute;
cloud;
attribute based ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-021-02915-5
Abstract: The introduction of attribute-based encryption (ABE) targets to achieve the implementation of single-to-numerous encryption; however, the sole authority challenge and the issue of distributed management of attributes are bottlenecks to its realization. Multi-authority attribute-based encryption…
read more here.
Keywords:
authority;
attribute based;
attribute;
survey ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Big data"
DOI: 10.1089/big.2021.0301
Abstract: Owing to the huge volume of big data, users generally use the cloud to store big data. However, because the data are out of the control of users, sensitive data need to be protected. The…
read more here.
Keywords:
big data;
attribute based;
encryption;
encryption scheme ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Access"
DOI: 10.1109/access.2017.2705076
Abstract: Fog computing is deemed as a highly virtualized paradigm that can enable computing at the Internet of Things devices, residing in the edge of the network, for the purpose of delivering services and applications more…
read more here.
Keywords:
encryption scheme;
fog;
attribute based;
based encryption ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "IEEE Access"
DOI: 10.1109/access.2017.2756070
Abstract: The privacy of users must be considered as the utmost priority in distributed networks. To protect the identities of users, attribute-based encryption (ABE) was presented by Sahai et al. ABE has been widely used in…
read more here.
Keywords:
equality test;
attribute based;
based encryption;
test ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2801266
Abstract: Electronic Health Records (EHRs) are entirely controlled by hospitals instead of patients, which complicates seeking medical advices from different hospitals. Patients face a critical need to focus on the details of their own healthcare and…
read more here.
Keywords:
signature scheme;
attribute based;
multiple authorities;
based signature ... See more keywords