46 Hits in 5.1 sec

Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing

Dawei Li, Jianwei Liu, Qianhong Wu, Zhenyu Guan
2019 IEEE Access  
In this paper, we propose a new cryptographic primitive, named CCA2 secure publicly-verifiable revocable large-universe multi-authority attribute-based encryption (CCA2-PV-R-LU-MA-ABE), to achieve flexible  ...  INDEX TERMS Fog computing, attribute-based encryption, distributed access control, multi-authority, large-universe.  ...  CONCLUSION An efficient CCA2 secure publicly-verifiable revocable large-universe multi-authority CP-ABE system for Fog Computing was defined in this paper, and we constructed a concrete scheme based on  ... 
doi:10.1109/access.2019.2890976 fatcat:pcsyelw4evcz7pomk2cwrvhgsu

Secure Efficient Revocable Large Universe Multi-authority Attribute-based Encryption for Cloud-aided IoT

Kaiqing Huang
2021 IEEE Access  
CONCLUSION In this article, the author proposes an efficient revocable large universe multi-authority attribute-based encryption based on prime order bilinear groups.  ...  Figure 2 , the proposed secure efficient revocable large universe multi-authority attribute-based encryption scheme for cloud aided IoT consists of the following entities.  ... 
doi:10.1109/access.2021.3070907 fatcat:f7wam3r4nvgrvcsbqyqexlf5kq

Fine-Grained Access Control Systems Suitable for Resource-Constrained Users in Cloud Computing

Yinghui Zhang, Dong Zheng, Rui Guo, Qinglan Zhao
2018 Computing and informatics  
In this paper, we present an access control system based on ciphertext-policy attribute-based encryption.  ...  Our access control system supports AND-gate access policies with multiple values and wildcards, and it can efficiently support direct user revocation.  ...  work is supported by National Key R & D Program of China (No. 2017YFB0802000), National Natural Science Foundation of China (No. 61772418, 61402366), Yinghui Zhang is supported by New Star Team of Xi'an University  ... 
doi:10.4149/cai_2018_2_327 fatcat:xboiiitac5bfxgufute7k5i4c4

Analysis of attribute-based cryptographic techniques and their application to protect cloud services

Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh
2019 Transactions on Emerging Telecommunications Technologies  
Attribute based cryptography is commonly used to provide encrypted and/or authenticated access to outsourced data in remote servers.  ...  energysavings, processing and storage efficiency and availability requirements.  ...  Wang et al. 34 proposed an efficient file hierarchy attribute-based encryption scheme in cloud computing.  ... 
doi:10.1002/ett.3667 fatcat:eu7rs5halbefrmbiipbf6t7c7e

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

2019 International Journal of Engineering  
By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage.  ...  Moreover, we propose an efficient revocation mechanism which is a very important challenge in the context.  ...  In 2005, Fuzzy Identity-Based Encryption or Attribute-Based Encryption is proposed [1] . In ABE, *Corresponding Author Email: (M.  ... 
doi:10.5829/ije.2019.32.09c.09 fatcat:f5go5sayn5cnfaksa56m4e6ms4

Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation

Qian Xu, Chengxiang Tan, Zhijie Fan, Wenye Zhu, Ya Xiao, Fujia Cheng
2018 Sensors  
A feasible and promising solution is the Attribute Based Signcryption (ABSC) scheme, which takes advantages of Attribute-Based Encryption (ABE) and Attribute-Based Signature (ABS), and is more efficient  ...  The proposed scheme is proven to be secure in the standard model and can provide attribute revocation and public verifiability.  ...  Attribute-Based Signature and Multi-Authority Attribute-Based Signature ABS was first introduced by Maji et al. [37] .  ... 
doi:10.3390/s18051609 pmid:29772840 pmcid:PMC5982144 fatcat:gb6boogecnf4vnoqfhxerlojii

The Cloud we Share: Extensible Fine-grained Access Control Enabled Data Sharing in Untrusted Cloud

Alexandros Bakas, Hai-Van Dang, Antonis Michalas, Alexandr Zalitko
2020 IEEE Access  
A revocable Ciphertext-Policy Attribute-based Encryption (CP-ABE) presented in [23] proposes to embed the revocation list in the ciphertexts.  ...  Similarly, in [11] authors constructed a Key-Policy ABE (KP-ABE) by extending their work on Revocable Identity Based Encryption.  ...  Her research interests include privacy-preserving protocols, searchable encryption, authentication and authorization in cloud computing. P rof.  ... 
doi:10.1109/access.2020.3038838 fatcat:qckfmnq3pnf2fcsmiwarzlnuye

A review of the state of the arts in privacy and security in the eHealth cloud

Aqeel Sahi, David Lai, Yan Li
2021 IEEE Access  
In 2014, Yang and Jia proposed a multi-authority access control scheme [56] . In that scheme, the authors presented a Ciphertext-Policy Attribute-based Encryption (CP-ABE) scheme.  ...  The proposed scheme used an attribute-based encryption (ABE), proxy re-encryption (PRE), and lazy re-encryption.  ...  Author Name: Preparation of Papers for IEEE Access (February 2017) VOLUME XX, 2017  ... 
doi:10.1109/access.2021.3098708 fatcat:u6b4oflz2ndxtbape5becffffu

D2.2 - Attribute-Based Encryption, Dynamic Credentials and Ciphertext Delegation and Integration in Medical Devices

Tampere University, RISE Research Institutes Of Sweden AB, SECURA BV
2020 Zenodo  
Overview of the existing Attribute-Based Encryption and Ciphertext Delegation schemes and analysis on how such schemes can help healthcare organisations to securely share data by also preserving users'  ...  be necessary to have the possibility to have a large attribute universe.  ...  The authors propose a Multi-Authority CP-ABE scheme that achieves both backward and forward security and is efficient as it outsources part of the decryption process to the without allowing the to learn  ... 
doi:10.5281/zenodo.4022312 fatcat:j5appusbybfcxbfzs6vzlgjm6i

A Lightweight and Formally Secure Certificate Based Signcryption with Proxy Re-Encryption (CBSRE) for Internet of Things Enabled Smart Grid

Saddam Hussain, Insaf Ullah, Hizbullah Khattak, Muhammad Adnan, Saru Kumari, Syed Sajid Ullah, Muhammad Asghar Khan, Shah Jahan Khattak
2020 IEEE Access  
Furthermore, the proposed scheme provides the security requirements of confidentiality (IND-CBSRE-CCA2-I and IND-CBSRE-CCA2-II), unforgeability (EUF-CBSRE-CMA-I and EUF-CBSRE-CMA-II) and forward secrecy  ...  Thus, in this paper, we propose a lightweight certificate-based signcryption with a proxy re-encryption (CBSRE) scheme for smart grid based-IoT devices with the intention of reducing the computational  ...  [49] , presented a multi-authority attribute-based signcryption scheme in order to enable the SG operators and electricity suppliers to communicate securely with their respective users in a (downlink  ... 
doi:10.1109/access.2020.2994988 fatcat:yjgk76mci5d6nezptwu6dioxue

A Survey on Secure Cloud-Based E-Health Systems

Dilip Yadav, Sephali Behera
2018 EAI Endorsed Transactions on Pervasive Health and Technology  
This work presents a literature survey on secure cloud-based e-health systems.  ...  Seventy-seven research papers related to secure cloud-based e-health systems are collected from different sources till 2019.  ...  any single encryption technique Fast encryption and decryption than AES and Blowfish Generates large prime numbers for the generation of keys and manages the keys efficiently - [61] IBE + HE  ... 
doi:10.4108/eai.13-7-2018.163308 fatcat:zxjtineopbautdg6nlqr3e4fma

A Multi-User Ciphertext Policy Attribute-Based Encryption Scheme with Keyword Search for Medical Cloud System

Han-Yu Lin, Yan-Ru Jiang
2020 Applied Sciences  
A ciphertext policy attribute-based encryption (CP-ABE) is a cryptographic primitive for fine-grained access control of outsourced data in clouds.  ...  In order to enable patients to effectively store his medical records and PHR data in medical clouds, we propose an improved multi-user CP-ABE scheme with the functionality of keyword search which enables  ...  Conflicts of Interest: The authors declare that they have no conflict of interest.  ... 
doi:10.3390/app11010063 fatcat:wfstnmsfd5cabjbthxn4bkec3q

Privacy-Enhancing Group Signcryption Scheme

Sara Ricci, Petr Dzurenda, Jan Hajny, Lukas Malina
2021 IEEE Access  
Furthermore, the scheme is extended to work in a multi-receiver scenario, where an authorized group of receivers is able to unsigncrypt the ciphertext.  ...  The security analysis of the scheme is also provided.  ...  It is assumed that the attribute authority is a TTP that can assure the validity of the users' encrypted attributes.  ... 
doi:10.1109/access.2021.3117452 fatcat:ptnjlgfw4rcqzg6bupgszkxwh4

Simultaneous authentication and secrecy in identity-based data upload to cloud

Bo Qin, Huaqun Wang, Qianhong Wu, Jianwei Liu, Josep Domingo-Ferrer
2013 Cluster Computing  
Observing that cloud is most interesting to companies in which multiple authorized employees are allowed to upload data, we propose a general framework for secure data upload in an identity-based setting  ...  With our IBSC proposal, a secure data upload scheme is instantiated with simultaneous authentication and secrecy in a multi-user setting.  ...  Acknowledgements For the authors with the UNESCO Chair in Data Privacy, this paper does not necessarily reflect the position of UN-ESCO nor does it commit that organization.  ... 
doi:10.1007/s10586-013-0258-7 fatcat:nfvi27rxgbenvip4x42redtnha

Post-Quantum Era Privacy Protection for Intelligent Infrastructures

Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, Raimundas Matulevicius, Abasi-amefon O. Affia, Maryline Laurent, Nazatul Haque Sultan, Qiang Tang
2021 IEEE Access  
This in-depth survey begins with an overview of security and privacy threats in IoT/IIs.  ...  Next, we summarize some selected Privacy-Enhancing Technologies (PETs) suitable for privacy-concerned II services, and then map recent PET schemes based on post-quantum cryptographic primitives which are  ...  [141] , multi-recipient keyword search [142] , and so on. 3) ATTRIBUTE-BASED ENCRYPTION Attribute-Based Encryption (ABE) is a public-key encryption technique.  ... 
doi:10.1109/access.2021.3062201 fatcat:kqcwwqjfjnds7bzlrid7r6gjlu
« Previous Showing results 1 — 15 out of 46 results