Articles with "based encryption" as a keyword



Photo by aleexcif from unsplash

Ciphertext-policy attribute-based encryption supporting access policy update and its extension with preserved attributes

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal of Information Security"

DOI: 10.1007/s10207-017-0388-7

Abstract: Attribute-based encryption (ABE) allows one-to-many encryption with static access control. In many occasions, the access control policy must be updated, but the original encryptor might be unavailable to re-encrypt the message, which makes it impractical.… read more here.

Keywords: policy; access policy; attribute based; access ... See more keywords
Photo by lucabravo from unsplash

MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-020-01710-y

Abstract: The development of Electronic Information Technology has made the Electronic Medical Record a commonly used approach to recording and categorizing medical patient data in databases of different hospitals and medical entities so that controlling the… read more here.

Keywords: scheme; attribute based; technology; medical data ... See more keywords
Photo from wikipedia

A survey on multi-authority and decentralized attribute-based encryption

Sign Up to like & get
recommendations!
Published in 2022 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-021-02915-5

Abstract: The introduction of attribute-based encryption (ABE) targets to achieve the implementation of single-to-numerous encryption; however, the sole authority challenge and the issue of distributed management of attributes are bottlenecks to its realization. Multi-authority attribute-based encryption… read more here.

Keywords: authority; attribute based; attribute; survey ... See more keywords
Photo by anniespratt from unsplash

An Attribute-Based Encryption Scheme to Secure Fog Communications

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Access"

DOI: 10.1109/access.2017.2705076

Abstract: Fog computing is deemed as a highly virtualized paradigm that can enable computing at the Internet of Things devices, residing in the edge of the network, for the purpose of delivering services and applications more… read more here.

Keywords: encryption scheme; fog; attribute based; based encryption ... See more keywords
Photo by drew_hays from unsplash

Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Access"

DOI: 10.1109/access.2017.2756070

Abstract: The privacy of users must be considered as the utmost priority in distributed networks. To protect the identities of users, attribute-based encryption (ABE) was presented by Sahai et al. ABE has been widely used in… read more here.

Keywords: equality test; attribute based; based encryption; test ... See more keywords

CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2873019

Abstract: Identity-based encryption (IBE) is a very attractive cryptographic primitive due to its unnecessity of any certificate managements. Nevertheless, the user revocation problem in IBE remains an elusive research problem and hence, it is an important… read more here.

Keywords: identity based; cloud; encryption; ciphertext evolution ... See more keywords
Photo by mullyadii from unsplash

Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2907364

Abstract: The notion of attribute-based encryption with outsourced decryption (OD-ABE) was proposed by Green, Hohenberger, and Waters. In OD-ABE, the ABE ciphertext is converted to a partially-decrypted ciphertext that has a shorter bit length and a… read more here.

Keywords: decryption; attribute based; generic approach; security ... See more keywords

Multi-Authority Attribute-Based Encryption with Dynamic Membership from Lattices

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3179110

Abstract: Attribute-based encryption is useful for one-to-many encrypted message sending. However, most attribute-based encryption schemes authorize and issue attributes to users by a single authority. Such a scenario conflicts with practical requirements and may cause the… read more here.

Keywords: dynamic membership; encryption; based encryption; authority ... See more keywords
Photo by markusspiske from unsplash

LMIBE: Lattice-Based Matchmaking Identity-Based Encryption for Internet of Things

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3240304

Abstract: Under the usage of new technologies, Internet of Things (IoT) develops rapidly and provides a great convenience for our lives. It is critical for ensuring security to IoT systems as the tremendous growth of IoT… read more here.

Keywords: encryption; identity based; based encryption; security ... See more keywords
Photo by drew_hays from unsplash

Efficient Policy-Hiding and Large Universe Attribute-Based Encryption With Public Traceability for Internet of Medical Things

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3051362

Abstract: Modern day medical systems are closely integrated and interconnected with other systems, such as those comprising Internet-of-Medical Things (IoMT) devices that facilitate remote healthcare services, say during pandemics (e.g., COVID-19). Attribute-based encryption (ABE) is a… read more here.

Keywords: internet medical; attribute based; medical things; policy ... See more keywords
Photo by neom from unsplash

O3-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3055541

Abstract: With the processes of collecting, analyzing, and transmitting the data in the Internet of Things (IoT), the Internet of Medical Things (IoMT) comprises the medical equipment and applications connected to the healthcare system and offers… read more here.

Keywords: attribute based; iomt ecosystem; encryption scheme; based encryption ... See more keywords