A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption
2015
IEEE Transactions on Information Forensics and Security
Attribute-based encryption (ABE) with outsourced decryption not only enables fine-grained sharing of encrypted data, but also overcomes the efficiency drawback (in terms of ciphertext size and decryption ...
In this paper, we first formalize a security model of ABE with verifiable outsourced decryption by introducing a verification key in the output of the encryption algorithm. ...
Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption data confidential and enforce access control policies correctly. ...
doi:10.1109/tifs.2015.2410137
fatcat:sbilsv3xvraq5inh5qsr4tu2pu
Enhancing the Efficiency of Key Management Protocol in Attribute based Encryption for Cloud Data Sharing
2019
International Journal for Research in Applied Science and Engineering Technology
Hence, we proposed a new and improvised method that is ABE with Verifiable Outsourced Decryption with KEM(key encapsulation mechanisms). ABE scheme was proposed by Sahai and Waters in 2005 year. ...
ABE is the mechanism in which users are allowed to encrypt and decrypt data based on the attributes provided by the user. ...
The formal definition of attribute-based KEM with outsourced decryption is exactly the same as that of ABE with outsourced decryption, except that the encryption algorithm of ABE is replaced by an encapsulation ...
doi:10.22214/ijraset.2019.6154
fatcat:6adyu2c2zvcsncxkk3tza2r45e
Concrete Attribute-Based Encryption Scheme with Verifiable Outsourced Decryption
[article]
2014
arXiv
pre-print
Attribute based encryption is a public-key-based one-to-many encryption that allows users to encrypt and decry pt data based on user attributes. ...
One.One of the main efficiency drawbacks of the existing ABE schemes is that decryption involves expensive pairing operations and the number of such operations grows with the complexity of the access policy ...
Conclusion: In this paper we considered a new requirement of ABE with outsourced decryption: efficiency, verifiability. ...
arXiv:1407.3660v1
fatcat:gcdrnkhkzbao3o5544exvkdmxe
An Attribute-Based Encryption Method Using Outsourced Decryption and Hierarchical Access Structure
2022
Journal of Telecommunications and Information Technology
Ciphertext policy-based attribute-based encryption (CPABE) is one of the most widely used methods for providing encrypted access control. ...
This paper presents an efficient method consisting in outsourcing decryption operations to a third-party server, so that complex operations may be performed by that machine with only some simple calculations ...
An efficient outsourced ABE scheme with verifiability of transformation based on the key encapsulation mechanism is proposed in [6] . ...
doi:10.26636/jtit.2022.158421
fatcat:danevprqbngovohcltsrgrweee
Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing
2017
KSII Transactions on Internet and Information Systems
Attribute-based encryption, widely applied in cloud computing, incurs massive computational cost during the encryption and decryption phases. ...
The scheme is called the verifiable outsourced computation ciphertext-policy attribute-based encryption scheme (VOC-CP-ABE), and it provides a way to outsource intensive computing tasks during encryption ...
[16] proposed securely outsourced attribute-based encryption with checkability, which supports both outsourced key issuing and decryption. ...
doi:10.3837/tiis.2017.06.024
fatcat:h3ex5kn5afeatb25gm6tf4lzca
A Study on CP-ABE-based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment
2020
Sensors
This paper focuses on the IoMT environment for a study of a CP-ABE-based medical data sharing system with key abuse prevention and verifiable outsourcing in a cloud environment. ...
Many studies have been conducted on access control techniques using ciphertext-policy attribute-based encryption (CP-ABE), a form of attribute-based encryption, among various security technologies and ...
Figure 2 . 2 Attribute-Based Encryption (Left ciphertext-policy attribute-based encryption (CP-ABE), Right key-policy attribute-based encryption (KP-ABE)). ...
doi:10.3390/s20174934
pmid:32878202
pmcid:PMC7506716
fatcat:zuqhdxs2eveepntqo7h6gojeea
AN EXTENSIVE STUDY TOWARDS ACHIEVING FINE GRAINED ACCESS CONTROL ON ENCRYPTED CLOUD DATA
2018
International Journal of Advanced Research in Computer Science
Even obtaining encryption key and decryption key, attacker will not help in decrypting the ciphertext. ...
Through extensive analysis on different fine grained access control mechanism on the outsourced data, the ensemble operator model can gain significant performance to highlight the scalability and efficiency ...
Attribute based encryption with efficient verifiable outsourced decryption In this literature, Fine grained access control is enabled in terms of attribute-based encryption (ABE) in order to prevent the ...
doi:10.26483/ijarcs.v9i3.6118
fatcat:5cg7ewgzbjemtdaojlsr7mm75e
User Privacy Protection Scheme Based on Verifiable Outsourcing Attribute-Based Encryption
2021
Security and Communication Networks
Therefore, this paper proposes a verifiable attribute-based encryption scheme for a fully outsourced ciphertext policy. ...
In the cloud storage services, although attribute-based encryption can protect users' data security, the computational cost of key generation, data encryption, and data decryption linearly increases with ...
Attribute-based encryption usually cooperates with symmetric encryption to encrypt plaintext data, that is, encrypt plaintext with the symmetric key, and then encapsulates the symmetric key with attribute-based ...
doi:10.1155/2021/6617669
fatcat:vvhhvawodraaned2pzykve5quq
Secure Data Sharing with Lightweight Computation in E-Health
2020
IEEE Access
INDEX TERMS edge computing, attribute-based encryption, modular exponentiation, outsourcing calculation verifiability. ...
The proposed Mask Algorithm along with blind pairs conceals the bases and exponents of the encrypted data, thus preserving the privacy of sensitive data in the process of outsourced computing. ...
[5] presented a more efficient and universal ABE structure with verifiable outsourcing decryption is proposed. ...
doi:10.1109/access.2020.3039866
fatcat:fwe3x3koyjdndpgk3q4mj5oejy
An Efficient Encryption Scheme with Verifiable Outsourced Decryption in Mobile Cloud Computing
[article]
2018
arXiv
pre-print
To further reduce the decryption overhead on data receivers, we additionally propose a verifiable outsourced decryption scheme. ...
A promising public key encryption scheme, Attribute-Based Encryption (ABE), especially the Ciphertext Policy Attribute-Based Encryption (CP-ABE), has been used for realizing fine-grained access control ...
Compared with this scheme, Lin et al [15] proposed a more efficient construction ABE with verifiable outsourced decryption, which reduced the bandwidth and the computation costs almost by half. ...
arXiv:1810.10750v1
fatcat:y264ga5ctrehfnrq7ytkwvjf2e
Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption
2016
Science China Information Sciences
Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption. Sci China Inf Sci, 2016, 59(9): 099105, ...
The responsibility for scientific accuracy and content remains entirely with the authors. ...
Dear editor, Attribute-based encryption (ABE) was first introduced by Sahai and Waters [1] where the decryption ability of a user is based on his attributes. ...
doi:10.1007/s11432-016-0012-9
fatcat:vkjxqglpnjgoljw3ynvius7ezy
Attribute-Based Encryption With Verifiable Outsourced Decryption
2013
IEEE Transactions on Information Forensics and Security
Attribute-based encryption with verifiable outsourced decryption. (2013). ...
Index Terms-Attribute-based encryption, outsourced decryption, verifiability. ...
To assess the performance of our ABE scheme with verifiable outsourced decryption, we implement the CP-ABE scheme with verifiable outsourced decryption and conduct experiments on both an ARM-based mobile ...
doi:10.1109/tifs.2013.2271848
fatcat:5f5dflg5qvahfix2zqgp5dfc5y
Reliable Bulk-Data Dissemination in Delay Tolerant Networks
2014
IEEE Transactions on Parallel and Distributed Systems
Attribute-Based Encryption (ABE) is a promising cryptographic primitive which significantly enhances the versatility of access control mechanisms. ...
In addition, for the first time, we propose an outsourced ABE construction which provides checkability of the outsourced computation results in an efficient way. ...
Private key associated with access structure that control which cipher text a user is able to decrypt. We are using attribute-based encryption (ABE) as the main encryption primitive. ...
doi:10.1109/tpds.2013.221
fatcat:t5f5xpdauvektdc6wtmdgvlhqa
Key Aggregate Cryptosystem for Group Sharing Data on Cloud Storage
2016
IJARCCE
This paper generally tend to expose the way to firmly, expeditiously, and flexibly proportion understanding with others in cloud garage. ...
This compact combination key can be handily sent to others or be preserve on terribly revolving credit with very limited comfy storage. ...
The on pinnacle of statement motivates unitedstates to check ABE (Attribute-Based Encryption) with verifiable outsourced coding at some stage in this thesis work. ...
doi:10.17148/ijarcce.2016.51254
fatcat:i3rimesd6ba3fj5z4g2zj27xsm
Privacy Preservation for eHealth Big Data in Cloud Accessed Using Resource-Constrained Devices: Survey
2019
International Journal of Network Security
In order to overcome these challenges associated with security and privacy, the data owner (hospital) encrypts data using Attribute Based Encryption (ABE) primitive due to the fine-grained access control ...
In this paper, a survey of ABE with outsourced decryption of the existing works that is applicable to resource-constrained device for accessing eHealth big data is provided. ...
[39] proposed a new CP-ABE scheme known as Offline/online attribute-based encryption with verifiable outsourced decryption protocol. ...
dblp:journals/ijnsec/KibiwottZKOO19
fatcat:m7t27irx6ja4rlkxa7vazvxu5q
« Previous
Showing results 1 — 15 out of 3,033 results