نتایج جستجو برای: attribute based encryption

تعداد نتایج: 2993376  

Alimoradi, Reza, Gholami, Ahmad, Noorallahzadeh, Mohammad Hossein,

With the advent of cloud computing, data owners tend to submit their data to cloud servers and allow users to access data when needed. However, outsourcing sensitive data will lead to privacy issues. Encrypting data before outsourcing solves privacy issues, but in this case, we will lose the ability to search the data. Searchable encryption (SE) schemes have been proposed to achieve this featur...

Journal: :Designs, Codes and Cryptography 2022

Abstract Attribute-based encryption (ABE) is a form of public-key that allows fine-grained access control on encrypted data. Blind key-generation (BKG) attribute-based (Rial, Designs, Codes and Cryptography 2016 ) variant in which the master authority issues secret keys without learning any information about attributes associated to them. This extra functionality makes it an appealing building ...

Journal: :Connection science 2021

Dispatching and Control Cloud (DCC) is a cloud platform constructed by State Grid Corporation with the technology of computing. DCC has improved overall operation monitoring capabilities, smart level many other advantages power grid. However, development been hampered security privacy issues. Secure unified identity authentication, access control authorisation management are significant topics ...

Journal: :IACR Cryptology ePrint Archive 2016
Riccardo Longo Chiara Marcolla Massimiliano Sala

Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms. In our proposal, a Multiple-Authorities Key-Policy Attribute-Based Encryption scheme is constructed in which the authorities collaborate to achieve shorter keys and parameters, enhancing the efficiency of encryption and decryption. We prove our system secure under an original variation of the bilinear DiffieHe...

Journal: :CoRR 2017
Aubrey Alston

Attribute-based encryption is a form of encryption which offers the capacity to encrypt data such that it is only accessible to individuals holding a satisfactory configuration of attributes. As cloud and distributed computing become more pervasive in both private and public spheres, attribute-based encryption holds potential to address the issue of achieving secure authentication, authorizatio...

1977
Steven W. Zucker

To reduce these amb igu i t i es , a second k ind of i n fo rmat ion f lowfeedbacki s necessary. Concept u a l l y , t h i s a l lows in fo rmat ion to move both hor i z o n t a l l y 'across a l l p o s i t i o n s a t a s i n g l e l e v e l o f abs t rac t i on and v e r t i c a l l y across a l l l e ve l s o f abs t r ac t i on a t a s i ng le p ro jec ted p o s i t i o n . Diagonal k inds...

Journal: :Journal of the Korea Institute of Military Science and Technology 2014

2011
Jonathan Katz Dominique Schröder

In a predicate encryption scheme an authority generates master public and secret keys, and uses the master secret key to derive personal secret keys for authorized users. Each user’s personal secret key SKf corresponds to a predicate f defining the access rights of that user, and each ciphertext is associated (by the sender) with an attribute. The security provided is that a ciphertext associat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید