Hierarchical authority based weighted attribute encryption scheme
نویسندگان
چکیده
منابع مشابه
Multi-Authority Attribute-Based Encryption Scheme from Lattices
Access control can selectively restrict access to sensitive information stored by third-party sites on the Internet. Attribute-based encryption (ABE) schemes can strengthen the effective combination of flexibility and operability of access control. They allow one sender to encrypt a message for more than one recipient, and to specify who should be able to decrypt, using attributes alone. Since ...
متن کاملVerifiable multi-authority attribute based encryption scheme with different permissions
In this paper, we study the traffic information granular computing theory and build traffic information fusion model, framework and implementation program based on granular computing. We raise uncertainty reduction algorithms for traffic flow prediction and congestion recognition algorithms based on granular computing theory, which will provide new ideas and methods in the complex decision maki...
متن کاملMulti-authority Attribute Based Encryption
In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in which each user is identified by a set of attributes, and some function of those attributes is used to determine decryption ability for each ciphertext. Sahai and Waters introduced a single authority attribute encryption scheme and ...
متن کاملKey-Policy Multi-authority Attribute-Based Encryption
Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms. In particular, they have been used to create an ABE system with multi authorities, but limited to the ciphertext-policy instance. Here, for the first time, we propose two multi-authority key-policy ABE systems. In our first proposal, the authorities may be set up in any moment and without any coordination. A p...
متن کاملThe Research on Multi-Authority Based Weighted Attribute Encryption Algorithm in the Cloud Computing Environment
In the cloud right weight attribute encryption scheme based on multi-agency. Under existing cloud computing environment based on multi-agency access control scheme generally do not take into account the weights of the attributes that the status attributes are equal. But in real life, with the right to property values are meaningful. Each attribute in the system that served as different roles, t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Science and Information Systems
سال: 2019
ISSN: 1820-0214,2406-1018
DOI: 10.2298/csis180912027t