نتایج جستجو برای: abe

تعداد نتایج: 1907  

2016
V. KALYANI

Cloud computing is a revolutionary computing environment, which allows user a flexible, on-demand, and low-cost usage of computing resources, but as the data is outsourced to some cloud servers, and various privacy issues emerge from it. To handle these security problems, various schemes based on the Attribute-Based Encryption have been proposed recently. Attribute-based Encryption (ABE) is a c...

2017
D. HARICHARAN REDDY

Cloud computing is a revolutionary computing environment, which allows user a flexible, on-demand, and low-cost usage of computing resources, but as the data is outsourced to some cloud servers, and various privacy issues emerge from it. To handle these security problems, various schemes based on the Attribute-Based Encryption have been proposed recently. Attribute-based Encryption (ABE) is a c...

2017
Gene Itkis Emily Shen Mayank Varia David Wilson Arkady Yerukhimovich

Attribute-based encryption (ABE) enables encryption of messages under access policies so that only users with attributes satisfying the policy can decrypt the ciphertext. In standard ABE, an arbitrary number of colluding users, each without an authorized attribute set, cannot decrypt the ciphertext. However, all existing ABE schemes rely on concrete cryptographic assumptions such as the hardnes...

Journal: :J. Inf. Sci. Eng. 2015
Sadikin Rifki Youngho Park Sangjae Moon

A new fully secure ciphertext-policy attributed based encryption (CP-ABE) scheme with high expressibity access policy is presented. Our CP-ABE scheme uses tree-based access structure which includes AND, OR, threshold and NOT gates which granted high degree of expressibility for encryptor to make an access policy. Moreover, our scheme achieves full security CP-ABE definition where any access str...

Journal: :Inf. Process. Lett. 2011
Rena Bakhshi Jörg Endrullis Wan Fokkink Jun Pang

We propose a probabilistic network model, called asynchronous bounded expected delay (ABE), which requires a known bound on the expected message delay. In ABE networks all asynchronous executions are possible, but executions with extremely long delays are less probable. Thus, the ABE model captures asynchrony that occurs in sensor networks and ad-hoc networks. At the example of an election algo...

Journal: :IJACT 2009
Keita Emura Atsuko Miyaji Akito Nomura Kazumasa Omote Masakazu Soshi

An Attribute-Based Encryption (ABE) is an encryption scheme, where users with some attributes can decrypt ciphertexts associated with these attributes. The length of the ciphertext depends on the number of attributes in previous ABE schemes. In this paper, we propose a new Ciphertext-Policy Attribute-Based Encryption (CP-ABE) with constant ciphertext length. In our scheme, the number of pairing...

2015
Haibo Huang Vijay Singh Nasib Qureshi

BACKGROUND Waste is currently a major problem in the world, both in the developing and the developed countries. Efficient utilization of food waste for fuel and chemical production can positively influence both the energy and environmental sustainability. This study investigated using food waste to produce acetone, butanol, and ethanol (ABE) by Clostridium beijerinckii P260. RESULTS In contro...

2017
V. Agalya

Attribute-based encryption (ABE) with outsourced decryption not only enables finegrained sharing of encrypted data, but also overcomes the effective drawback of the standard ABE schemes. An Attribute based encryption scheme with outsourced decryption allows a third party (e.g., a cloud server) to renovate an ABE cipher text into a (short) El Gamal-type cipher text using a public transformation ...

Journal: :I. J. Network Security 2015
Yongtao Wang Xiaonan Liu Lulu Liang Weiduan Feng Guang Yang

The notion of accountable authority introduced by Goyal (Crypto 2007) in identity-based encryption (IBE) setting is a novel approach to mitigate the (inherent) key escrow problem in identity based cryptosystems. As far as we know, the (inherent) key escrow problem also exists in attribute based encryption (ABE), for example ciphertext policy ABE (CP-ABE). In this paper, the concept of accountab...

2010
Yu Chen Hyun Sung Kim Jian-bin Hu Zhong Chen

RSS (Really Simple Syndication) has been introduced as a response to the need of efficient information distribution and subscription. However, the current RSS standard does not provide privacy preservation and confidentiality protection. Independently, the emergence of ABE (Attribute-based Encryption) provides us a brand new cryptographic primitive for access control. This paper sets out to exa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید