نتایج جستجو برای: attribute based encryption
تعداد نتایج: 2993376 فیلتر نتایج به سال:
With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...
Abstract Attribute-based encryption (ABE) is a form of public-key that allows fine-grained access control on encrypted data. Blind key-generation (BKG) attribute-based (Rial, Designs, Codes and Cryptography 2016 ) variant in which the master authority issues secret keys without learning any information about attributes associated to them. This extra functionality makes it an appealing building ...
Dispatching and Control Cloud (DCC) is a cloud platform constructed by State Grid Corporation with the technology of computing. DCC has improved overall operation monitoring capabilities, smart level many other advantages power grid. However, development been hampered security privacy issues. Secure unified identity authentication, access control authorisation management are significant topics ...
Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms. In our proposal, a Multiple-Authorities Key-Policy Attribute-Based Encryption scheme is constructed in which the authorities collaborate to achieve shorter keys and parameters, enhancing the efficiency of encryption and decryption. We prove our system secure under an original variation of the bilinear DiffieHe...
Attribute-based encryption is a form of encryption which offers the capacity to encrypt data such that it is only accessible to individuals holding a satisfactory configuration of attributes. As cloud and distributed computing become more pervasive in both private and public spheres, attribute-based encryption holds potential to address the issue of achieving secure authentication, authorizatio...
To reduce these amb igu i t i es , a second k ind of i n fo rmat ion f lowfeedbacki s necessary. Concept u a l l y , t h i s a l lows in fo rmat ion to move both hor i z o n t a l l y 'across a l l p o s i t i o n s a t a s i n g l e l e v e l o f abs t rac t i on and v e r t i c a l l y across a l l l e ve l s o f abs t r ac t i on a t a s i ng le p ro jec ted p o s i t i o n . Diagonal k inds...
In a predicate encryption scheme an authority generates master public and secret keys, and uses the master secret key to derive personal secret keys for authorized users. Each user’s personal secret key SKf corresponds to a predicate f defining the access rights of that user, and each ciphertext is associated (by the sender) with an attribute. The security provided is that a ciphertext associat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید