نتایج جستجو برای: attribute based encryption

تعداد نتایج: 2993376  

Journal: :IACR Cryptology ePrint Archive 2013
Stefan G. Weber

This article presents the design of a novel hybrid attributebased encryption scheme. The scheme is attribute-based, as it allows encrypting under logical combinations of attributes, i.e. properties that users satisfy. It is hybrid, as it combines ciphertext-policy attribute-based encryption (CP-ABE) with location-based encryption (LBE) on the level of symmetric keys. It can efficiently handle d...

Journal: :IACR Cryptology ePrint Archive 2017
Weijia Wang Zhijie Wang Bing Li Qiuxiang Dong Dijiang Huang

Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an access control mechanism over encrypted data and well suited for secure group-based communication. However, it also suffers from the following problem, i.e., it is impossible to build all desired groups. For example, if two group members have exactly the same attributes, how to construct a group including only one of the two members? O...

2018
Chih-Hung Wang Yu-Hsuan Chang

In the cloud computing, attribute-based encryption and public key encryption with keyword search are two popular issues. Ciphertext-policy attribute-based encryption is famous for its fine-grained access control. Keyword Search over encrypted files is an important function in the actual situation. We particularly concern the problem of revocation. Additionally, several solutions of the dynamic ...

2017
Shangping Wang Duqiao Zhao Yaling Zhang

Attribute based encryption (ABE) is a good way to achieve flexible and secure access control to data, and attribute revocation is the extension of the attribute-based encryption, and the keyword search is an indispensable part for cloud storage. The combination of both has an important application in the cloud storage. In this paper, we construct a searchable attribute-based encryption scheme w...

Journal: :J. Internet Serv. Inf. Secur. 2014
Keying Li Jianfeng Wang Yinghui Zhang Hua Ma

Cloud computing has come into our daily lives. The cloud server can provide powerful computing and storage capability as services. Since the decryption algorithm for attribute-based encryption needs a lot of computations, so with the help of cloud servers many attribute-based encryption schemes are designed for practical applications in cloud computing. To the best of our knowledge there does n...

Journal: :International Journal of Computer Applications 2016

Journal: :IACR Cryptology ePrint Archive 2016
Takeshi Koshiba Katsuyuki Takashima

We put forth a new mathematical framework called Isogenous Pairing Groups (IPG) and new intractable assumptions in the framework, the Isogenous DBDH (Isog-DBDH) assumption and its variants. Three operations, i.e., exponentiation, pairing and isogeny on elliptic curves are treated under a unified notion of trapdoor homomorphisms, and combinations of the operations have potential new cryptographi...

Journal: :J. Inf. Sci. Eng. 2011
Yong-Tao Wang Ke-Fei Chen Jian-Hong Chen

In this paper, we focus on traitor tracing scheme in attribute-based encryption (ABE) scenarios. A well-known concern in the setting of attribute-based encryption is that a user (or set of colluding users) can create a new key (or decryption device) by using his legal one and distribute it for malicious use. To mitigate this problem, we introduce the notion of attribute-based traitor tracing (A...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید