نتایج جستجو برای: attribute based encryption

تعداد نتایج: 2993376  

Journal: :Applied sciences 2022

The Internet of Medical Things (IOMT) is critical in improving electronic device precision, dependability, and productivity. Researchers are driving the development digital healthcare systems by connecting available medical resources services. However, there concerns about security sharing patients’ health records. In response to prevailing problems such as difficulties records between differen...

Journal: :IACR Cryptology ePrint Archive 2016
Xiaoyi Li Kaitai Liang Zhen Liu Duncan S. Wong

A Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows users to specify the access policies without having to know the identities of users. In this paper, we contribute by proposing an ABE scheme which enables revoking corrupted users. Given a key-like blackbox, our system can identify at least one of the users whose key must have been used to construct the blackbox and can revoke the k...

2015
Zhen Liu Duncan S. Wong

In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), access policies associated with the ciphertexts are generally role-based and the attributes satisfying the policies are generally shared by multiple users. If a malicious user, with his attributes shared with multiple other users, created a decryption blackbox for sale, this malicious user could be difficult to identify from the blackbox...

2017
Ahuja Roma Hailkar Kalyani

Cloud computing is innovation that uses advanced computational power and improved storage capacities. Cloud computing offer the number of significant advantages. One of the main advantage of cloud computing is pay-as-per-use, which means according to the use of service the customer has to pay. Where the prime disadvantage of cloud computing is achieving security to the data which is store in cl...

Journal: :Int. J. Comput. Math. 2009
Vladimir Bozovic Daniel Socek Rainer Steinwandt Viktória I. Villányi

An attribute based encryption scheme capable of handling multiple authorities was recently proposed by Chase. The scheme is built upon a single-authority attribute based encryption scheme presented earlier by Sahai and Waters. Chase’s construction uses a trusted central authority that is inherently capable of decrypting arbitrary ciphertexts created within the system. We present a multi-authori...

Journal: :J. Inf. Sci. Eng. 2015
Sadikin Rifki Youngho Park Sangjae Moon

A new fully secure ciphertext-policy attributed based encryption (CP-ABE) scheme with high expressibity access policy is presented. Our CP-ABE scheme uses tree-based access structure which includes AND, OR, threshold and NOT gates which granted high degree of expressibility for encryptor to make an access policy. Moreover, our scheme achieves full security CP-ABE definition where any access str...

Journal: :IJACT 2009
Keita Emura Atsuko Miyaji Akito Nomura Kazumasa Omote Masakazu Soshi

An Attribute-Based Encryption (ABE) is an encryption scheme, where users with some attributes can decrypt ciphertexts associated with these attributes. The length of the ciphertext depends on the number of attributes in previous ABE schemes. In this paper, we propose a new Ciphertext-Policy Attribute-Based Encryption (CP-ABE) with constant ciphertext length. In our scheme, the number of pairing...

2008
Nikita Borisov Soumyadeb Mitra

Compliance storage is an increasingly important area for businesses faced with a myriad of new document retention regulations. Today, businesses have turned to Write-One Read Many (WORM) storage technology to achieve compliance. But WORM answers only a part of the compliance puzzle; in addition to guaranteed document retention, businesses also need secure indexing, to ensure auditors can find r...

Journal: :IACR Cryptology ePrint Archive 2013
Xiang Xie Rui Xue

In this work, we present two Key-Policy Attribute-Based Encryption (ABE) schemes for some subclass of circuits based on the Learning with Error (LWE) assumption. Our constructions are selectively secure in the standard model. More specifically, our first construction supports a subclass of circuits with polynomially bounded depth. We call this subclass the OR-restricted circuits which means tha...

2016
Monica Suleiman Paolina Centonze

J u n e , 2 0 1 6 w w w . c i r w o r l d . c o m Role-Attribute-Based Encryption (RABE) Access Control for Healthcare Cloud Systems Monica Suleiman, Paolina Centonze 1 Research Scholar, Department of Computer Science, Iona College 715 North Avenue, New Rochelle NY 10801 [email protected] 2 Professor, Department of Computer Science, Iona College 715 North Avenue, New Rochelle NY 10801 p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید