![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts
Attribute-based encryption (ABE) allows user to encrypt and decrypt data based on user attributes, and can be applied in some promising area such as mobile cloud storage. Since these are massive users in these...
-
Chapter and Conference Paper
SEDOSN: A Secure Decentralized Online Social Networking Framework
Today’s online social networking services (OSN) such as Facebook, Twitter are centralized. Users’ information may be leaked by these service providers, which results in potential privacy problems. Decentralize...
-
Chapter and Conference Paper
Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability
To ensure the security of sensitive data, people need to encrypt them before uploading them to the public storage. Attribute-based encryption (ABE) is a promising cryptographic primitive for fine-grained shari...
-
Chapter and Conference Paper
Attribute-Based Encryption Without Key Escrow
Attribute-Based Encryption (ABE) is a promising cryptographic primitive for fine-grained sharing of encrypted data. However, ABE has a major shortcoming which is called the key escrow problem. Key generation c...