We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 9,795 results
  1. A Boolean circuit-based revocable ciphertext policy attribute-based encryption scheme

    Attribute-based encryption is a new cryptographic primitive that supports fine-grained access control of cloud data, and its access control function...

    Chao Ma, Haiying Gao, Bin Hu in The Journal of Supercomputing
    Article 02 February 2024
  2. Designing quantum-secure attribute-based encryption

    In the last couple of decades, Attribute-Based Encryption (ABE) has been a promising encryption technique to realize fine-grained access control over...

    Y. Sreenivasa Rao, Vikas Srivastava, ... Sumit Kumar Debnath in Cluster Computing
    Article 22 June 2024
  3. Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing

    Verifiable outsourced attribute-based encryption (VO-ABE) enables one-to-many data sharing and fine-grained access control under lower trust, making...

    **aolong Zhao, Zhenjie Huang in Cluster Computing
    Article 06 May 2024
  4. Attribute-based multiparty searchable encryption model for privacy protection of text data

    The problems of data storage and sharing have been well solved with cloud storage. However, the disadvantage is that users' messages are stored in...

    Shoulin Yin, Hang Li, ... Vania Vieira Estrela in Multimedia Tools and Applications
    Article 18 October 2023
  5. Fine-Grained Secure Attribute-Based Encryption

    Fine-grained cryptography is constructing cryptosystems in a setting where an adversary’s resource is a-prior bounded and an honest party has less...

    Yuyu Wang, Jiaxin Pan, Yu Chen in Journal of Cryptology
    Article 03 August 2023
  6. Anonymous attribute-based broadcast encryption with hidden multiple access structures

    Due to the high demands of data communication, the broadcasting system streams the data daily. This service not only sends out the message to the...

    Tran Viet Xuan Phuong in Designs, Codes and Cryptography
    Article Open access 06 April 2024
  7. Generic constructions of master-key KDM secure attribute-based encryption

    Master-key key-dependent message (mKDM) security is a strong security notion for attribute-based encryption (ABE) schemes, which has been...

    Jiaxin Pan, Chen Qian, Benedikt Wagner in Designs, Codes and Cryptography
    Article 09 September 2023
  8. Attribute-based encryption with enforceable obligations

    Attribute-based encryption (ABE) is a cryptographic mechanism that provides fine-grained access control to encrypted data, which can thus be stored...

    Hamed Arshad, Pablo Picazo-Sanchez, ... Gerardo Schneider in Journal of Cryptographic Engineering
    Article 29 April 2023
  9. Searchable Attribute-Based Proxy Re-encryption: Keyword Privacy, Verifiable Expressive Search, and Outsourced Decryption

    In this paper, we address the open problem posed by Ge et al. in 2020, which was to design a new attribute-based proxy re-encryption with keyword...

    Sourav Bera, Y. Sreenivasa Rao in SN Computer Science
    Article 23 April 2024
  10. Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment

    With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot....

    Liang Yan, Lina Ge, ... Zheng Hu in Journal of Cloud Computing
    Article Open access 18 April 2023
  11. Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation

    With the rapid deployment of storage services, secure and efficient user authorization and revocation data shared through the cloud have become a...

    Dilxat Ghopur, Jianfeng Ma, ... Tao Jiang in Science China Information Sciences
    Article 19 June 2023
  12. Secure access privilege delegation using attribute-based encryption

    Attribute-based encryption (ABE) is widely used for a secure and efficient data sharing. The predetermined access policy of ABE shares the data with...

    Suryakanta Panda, Samrat Mondal, ... Willy Susilo in International Journal of Information Security
    Article 06 April 2023
  13. Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud

    The encryption of user data is crucial when employing electronic health record services to guarantee the security of the data stored on cloud...

    **ming Li, Hao Wang, ... Qiong Huang in Cybersecurity
    Article Open access 03 March 2024
  14. Secure document sharing model based on blockchain technology and attribute-based encryption

    Various cryptographic approaches have been used to resolve concerns about data privacy shared in public cloud storage, assuming that the cloud...

    Garima Verma, Soumen Kanrar in Multimedia Tools and Applications
    Article 15 July 2023
  15. Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing

    The modern medical system is convergence of cutting-edge technologies and advancements in the healthcare environment. In the modern medical system,...

    Sujoy Roy, Jeet Agrawal, ... Udai Pratap Rao in Cluster Computing
    Article 20 February 2024
  16. Secure Cloud Data Access: Unifying Quantum Key Distribution and Attribute-Based Encryption for Enhanced Data Protection

    In today's advanced and technologically advanced world, cloud computing has emerged as a popular platform for managing and maintaining data,...

    Ashutosh Kumar, Garima Verma in SN Computer Science
    Article 16 October 2023
  17. Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing

    Cloud file sharing (CFS) has become one of the important tools for enterprises to reduce technology operating costs and improve their...

    Boxue Huang, Juntao Gao, Xuelian Li in Journal of Cloud Computing
    Article Open access 11 March 2023
  18. Designing an Attribute-Based Encryption Scheme with an Enhanced Anonymity Model for Privacy Protection in E-Health

    The medical field and the health care industry generate large volumes of data that are ultimately beneficial to society. Yet, the exposure of...

    Kirtirajsinh Zala, Hiren Kumar Thakkar, ... Deep Thumar in SN Computer Science
    Article 13 January 2024
  19. Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits

    Applying access structure to encrypted sensitive data is one of the challenges in communication networks and cloud computing. Various methods have...

    Mahdi MahdaviOliaee, Zahra Ahmadian in Journal of Computer Virology and Hacking Techniques
    Article 28 December 2022
  20. Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation

    Attribute-based encryption (ABE) is a promising approach to enables fine-grained access control for encrypted data in cloud storage. However, to...

    Shijie Deng, Gaobo Yang, ... Ming **a in Multimedia Tools and Applications
    Article 19 August 2022
Did you find what you were looking for? Share feedback.