نتایج جستجو برای: attribute based encryption

تعداد نتایج: 2993376  

Journal: :Security and Communication Networks 2021

Given the rapid development of cloud computing and storage technology, a growing number enterprises individuals use services to save data or back up data. In services, although attribute-based encryption can protect users’ security, computational cost key generation, encryption, decryption linearly increases with complexity access strategies, which becomes more critical for resource-constrained...

Journal: :I. J. Network Security 2017
Peng Hu Haiying Gao

By access structure and attribute set, attribute-based encryption realizes fine-grained access control and one to many encryption. The expression of access structure directly decides the application range of one scheme and the general circuit reaches the best form. Since the safety of multilinear maps is suffered question, using relatively efficient and safe bilinear maps to construct circuit a...

2011
Cheng Chen Zhenfeng Zhang Dengguo Feng

Spatial encryption was first proposed by Boneh and Hamburg in 2008. It is one implementation of the generalized identity-based encryption schemes and many systems with a variety of properties can be derived from it. Recently, Hamburg improved the notion by presenting a variant called doubly-spatial encryption. The doubly-spatial encryption is more powerful and expressive. More useful cryptograp...

Journal: :IACR Cryptology ePrint Archive 2008
Liming Fang Jinyue Xia

At EUROCRYPT 2005, Sahai and Waters presented the Fuzzy Identity Based Encryption (Fuzzy-IBE) which could be used for biometrics and attribute-based encryption in the selective-identity model. When a secure Fuzzy-IBE scheme in the selective-identity model is transformed to full identity model it exist an exponential loss of security. In this paper, we use the CPA secure Gentry's IBE (exponent i...

Journal: :Concurrency and Computation: Practice and Experience 2011
Guojun Wang Qin Liu Jie Wu

With more and more enterprises sharing their sensitive data on cloud servers, building a secure cloud environment for data sharing has attracted a lot of attention in both industry and academic communities. In this paper, we propose a conjunctive precise and fuzzy identity-based encryption (PFIBE) scheme for secure data sharing on cloud servers, which allows the encryption of data by specifying...

Journal: :IACR Cryptology ePrint Archive 2015
Jie Chen Romain Gay Hoeteck Wee

We present a modular framework for the design of efficient adaptively secure attribute-based encryption(ABE) schemes for a large class of predicates under the standard k-Lin assumption in prime-order groups; this is thefirst uniform treatment of dual system ABE across different predicates and across both composite and prime-ordergroups. Via this framework, we obtain concrete efficie...

Journal: :I. J. Network Security 2014
Yongtao Wang

A lattice ciphertext policy attribute based encryption (CP-ABE) scheme is presented, in which the ciphertext policy achieved is the AND-gates on multi-valued attributes. The previous construction with AND-gates on multi-valued attributes as ciphertext policy is based on bilinear paring technology. In this paper, inspired by the recent progress of lattice identity based encryption scheme, we ach...

Journal: :I. J. Network Security 2005
Deholo Nali Carlisle M. Adams Ali Miri

Threshold attribute-based encryption (thABE) is a variant of identity-based encryption which views identities as sets of descriptive attributes. If a thABE ciphertext c is computed for a set ω of attributes, then, to decrypt c, a user must have keys associated with a sufficiently large subset of ω. One application of thABE is biometric-based access control (BBAC). Practical BBAC applications im...

Journal: :I. J. Network Security 2015
Yongtao Wang Xiaonan Liu Lulu Liang Weiduan Feng Guang Yang

The notion of accountable authority introduced by Goyal (Crypto 2007) in identity-based encryption (IBE) setting is a novel approach to mitigate the (inherent) key escrow problem in identity based cryptosystems. As far as we know, the (inherent) key escrow problem also exists in attribute based encryption (ABE), for example ciphertext policy ABE (CP-ABE). In this paper, the concept of accountab...

2014
K. Bindu Madhavi C. Sudarsan Reddy

The rapid growth of usage of Digital technology leads to storage of all categories and types of data in digital media. As the technology is very fast in maintenance and also in data theft. We require providing security for the data stored in the digital media various data security techniques have introduced for the last 5 decades, but all those techniques are only key based techniques. All the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید