نتایج جستجو برای: attribute based encryption
تعداد نتایج: 2993376 فیلتر نتایج به سال:
A model by which information technology services being delivered is resources are retrieved from the internet through web-based tools and applications, instead of direct connection to a server. The Data and software packages are stored in servers. However, cloud computing structure allows access to information as long as an electronic device has access to the web. In this technology users have ...
In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in which each user is identified by a set of attributes, and some function of those attributes is used to determine decryption ability for each ciphertext. Sahai and Waters introduced a single authority attribute encryption scheme and ...
In this work, we present HIBE and ABE schemes which are “unbounded” in the sensethat the public parameters do not impose additional limitations on the functionality of thesystems. In all previous constructions of HIBE in the standard model, a maximum hierarchydepth had to be fixed at setup. In all previous constructions of ABE in the standard model,either a small universe size o...
Cloud computing is one of the most influential domain in the information technology. Encryption scheme perform sequence implicit operation on the plaintext by processing the original text which supports all the operations increases the storage capacity and provides the secure data transfer. In order to realize scalable, flexible, and fine-grained access control of outsourced data in cloud compu...
We develop a new methodology for utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full security. This deepens the relationship between the selective and full security models and provides a path for transferring the best qualities of selectively secure systems to fully secure systems. In particular, we prese...
According to the broadcast encryption scheme with wide applications in the real world without considering its security and efficiency in the model simultaneously an “unbounded”, Key-Policy Attribute-Based Broadcast Encryption scheme(KP-ABBE) was proposed by combining with waters dual system encryption, attribute-based encryption and broadcast encryption system. Based on the standard model, the ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید