Filters








1,523 Hits in 7.5 sec

CONCEPTUAL FRAMEWORK FOR LIGHTWEIGHT CIPHERTEXT POLICY-ATTRIBUTE BASED ENCRYPTION SCHEME FOR INTERNET OF THINGS DEVICES

Nurhidayah Muhammad, Jasni Mohamad Zain
<span title="2019-07-01">2019</span> <i title="UiTM Press, Universiti Teknologi MARA"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/i2sjszc74rdbvl2rv4qjaxvple" style="color: black;">MALAYSIAN JOURNAL OF COMPUTING</a> </i> &nbsp;
Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices.  ...  Lightweight cryptography scheme has been discussed and proposed widely recently.  ...  Therefore key design criteria in a CP-ABE scheme should include constant size secret key and constant size ciphertext, as well as a cost efficient mechanism for encryption and decryption.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.24191/mjoc.v4i1.6107">doi:10.24191/mjoc.v4i1.6107</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hovykfn7tjghpd44xdhf5jqwui">fatcat:hovykfn7tjghpd44xdhf5jqwui</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220115033504/https://mjoc.uitm.edu.my/main/images/journal/vol4-1-2019/MJOC_vol41_seq6.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/61/71/61710d045f802ebddd8d1b1ea011a9bd4872e911.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.24191/mjoc.v4i1.6107"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Current Issues in Ciphertext Policy-Attribute Based Scheme for Cloud Computing: A Survey

Norhidayah Muhammad, Jasni Mohamad Zain, Mumtazimah Mohamad
<span title="2018-04-06">2018</span> <i title="Science Publishing Corporation"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/piy2nrvrjrfcfoz5nmre6zwa4i" style="color: black;">International Journal of Engineering &amp; Technology</a> </i> &nbsp;
ABE contains two types, namely, Ciphertext Policy-Attribute Based Encryption (CP-ABE) and Key Policy- Attribute based Encryption (KP-ABE).  ...  Despite this, security concerns in cloud computing must be a top priority. One of the common encryption methods in cloud security is Attribute Based Encryption (ABE).  ...  Zhou [10] has proposed an algorithm named Privacy Preserving Constant-size Ciphertext Policy Attribute Based Encryption (PP-CP-ABE), which enforces access policies with wildcards and incurs constant-size  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14419/ijet.v7i2.15.11215">doi:10.14419/ijet.v7i2.15.11215</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2z6ps7qzureffpzgwydyjzehei">fatcat:2z6ps7qzureffpzgwydyjzehei</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721061721/https://www.sciencepubco.com/index.php/ijet/article/download/11215/4260" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/02/e1/02e1ae2347fb07906d4396bcc36758117a623d3e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14419/ijet.v7i2.15.11215"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Improving Security in Multi Authority Attribute Based Encryption with Fast Decryption

Nikita Gorasia, R.R. Srikanth, Nishant Doshi, Jay Rupareliya
<span title="">2016</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cx3f4s3qmfe6bg4qvuy2cxezyu" style="color: black;">Procedia Computer Science</a> </i> &nbsp;
In this paper, a secure multi authority attribute based encryption with fast decryption scheme is design.  ...  Attribute Based Encryption (ABE) is a type of public encryption in decryptor can only decrypt the ciphertext if its attributes of secret key matches the attributes of ciphertext but functionality comes  ...  [11] proposed a scheme which supports features like constant computational cost and constant ciphertext length. Based on AND-gates with multivalued attribute values and wildcard.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.procs.2016.03.080">doi:10.1016/j.procs.2016.03.080</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4xe2wa3c2zd7dpb443lppeqjva">fatcat:4xe2wa3c2zd7dpb443lppeqjva</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20171004200100/http://publisher-connector.core.ac.uk/resourcesync/data/elsevier/pdf/e5b/aHR0cDovL2FwaS5lbHNldmllci5jb20vY29udGVudC9hcnRpY2xlL3BpaS9zMTg3NzA1MDkxNjAwMjExOA%3D%3D.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/44/65/4465f9ae06b06cecd1a45dd9ba37174bbe9e9944.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.procs.2016.03.080"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>

Cryptographic Algorithms for Efficient and Secure Data Sharing in Cloud Storage
IJARCCE - Computer and Communication Engineering

Shweta. P. Tenginkai, Vani K. S
<span title="2015-02-28">2015</span> <i title="Tejass Publisheers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ezm4lr6uezhi5pfgr6xkdexmgy" style="color: black;">IJARCCE</a> </i> &nbsp;
There is a need for a mechanism which can minimize the cost of storing these ciphertexts and keys in a secured way.  ...  With the introduction of encryption and decryption schemes, the storing, sharing and securing of data became rampant.  ...  In this [2] paper, five different ABE schemes are surveyed, described and compared-Attribute-based Encryption (ABE), Key-Policy Attribute-based Encryption (KP-ABE), Ciphertext-policy (CP-ABE), ABE with  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17148/ijarcce.2015.4260">doi:10.17148/ijarcce.2015.4260</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tap54egks5ezdjenaw55vctt3q">fatcat:tap54egks5ezdjenaw55vctt3q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602185205/https://ijarcce.com/upload/2015/february-15/IJARCCE4O.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/60/91/6091b5201b25a167ed9025244fd55f74af15957d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17148/ijarcce.2015.4260"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing

<span title="2014-11-30">2014</span> <i title="Korean Society for Internet Information (KSII)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hupfbobgkvepdnt5g32qxkypsy" style="color: black;">KSII Transactions on Internet and Information Systems</a> </i> &nbsp;
Attribute-based encryption (ABE) is a promising cryptographic primitive for implementing fine-grained data sharing in cloud computing.  ...  Aiming at tackling the challenge above, we formalize the notion of ciphertext-policy ABE supporting flexible and direct revocation (FDR-CP-ABE), and present a concrete construction.  ...  Compared with the directly revocable schemes in [9] , our FDR-CP-ABE is more efficient in terms of the system public key size and decryption cost.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3837/tiis.2014.11.021">doi:10.3837/tiis.2014.11.021</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4oqimlgjfjgz3hxgggsgbrveqe">fatcat:4oqimlgjfjgz3hxgggsgbrveqe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220228010508/http://itiis.org/digital-library/manuscript/file/20656/TIISVol8No11-21.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3e/8b/3e8b55b259800ce67ff4c8e3c342d600817f8f5a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3837/tiis.2014.11.021"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Novel Constant size Cipher-text Scheme for Security in Real-time Systems

M. Dhivya, S. Venkatraman, Tina Belinda Miranda
<span title="2015-04-29">2015</span> <i title="Association of Technology and Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/lhvdmzuqxreinc3m4ancngr4qi" style="color: black;">International Journal of Computer Applications Technology and Research</a> </i> &nbsp;
However, current 'secure attribute based system with short ciphertext' schemes suffer from the issue of having long decryption keys, in which the size is linear to and dependent on the number of attributes.Ciphertext-Policy  ...  In this paper, we consider 'secure attribute based system with short ciphertext' is a tool for implementing fine-grained access control over encrypted data, and is conceptually similar to traditional access  ...  Based on the key only, attributes are encrypted and provide the cipher text values. Encryption is done independent on number of attributes with constant size decryption keys.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7753/ijcatr0405.1002">doi:10.7753/ijcatr0405.1002</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ue6ixv7kuvhxnhfqij6zi7aywy">fatcat:ue6ixv7kuvhxnhfqij6zi7aywy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180604031919/http://ijcat.com/archives/volume4/issue5/ijcatr04051002.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f1/bf/f1bf4380a522bf4168c7b47fcdc70c48363db72b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7753/ijcatr0405.1002"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Privacy Preserving and Efficient Multi Authority – CP-ABE Scheme for Secure Cloud Communication

Shardha Porwal, Sangeeta Mittal
<span title="2021-02-09">2021</span> <i title="River Publishers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7fvtrv6o65gszpj46refzq3jw4" style="color: black;">Journal of Cyber Security and Mobility</a> </i> &nbsp;
In the cloud computing environment, Multi authority Ciphertext Policy-Attribute Based Encryption (CP-ABE) schemes are used as a key escrow free solution to securely and efficiently share data over cloud  ...  However, the length of ciphertext in existing Multi Authority-CP-ABE schemes increases with the number of attributes in the access policy.  ...  Based on whether the access policy is attached with secret key or the ciphertext, ABE can be implemented as Key Policy based ABE (KP-ABE) and Ciphertext Policy based ABE (CP-ABE) respectively [2, 3] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13052/jcsm2245-1439.945">doi:10.13052/jcsm2245-1439.945</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ruw6waijtng2tmslorsvd37fxe">fatcat:ruw6waijtng2tmslorsvd37fxe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210414230200/https://journals.riverpublishers.com/index.php/JCSANDM/article/download/4789/5097" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ec/f7/ecf7be3b1d7302e93a06d7f4b34326783c356da9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.13052/jcsm2245-1439.945"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Analysis of attribute-based cryptographic techniques and their application to protect cloud services

Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh
<span title="2019-06-17">2019</span> <i title="Wiley"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wuw4sh5ufve5hbbawxmr7y7cre" style="color: black;">Transactions on Emerging Telecommunications Technologies</a> </i> &nbsp;
Attribute based cryptography is commonly used to provide encrypted and/or authenticated access to outsourced data in remote servers.  ...  energysavings, processing and storage efficiency and availability requirements.  ...  Wang et al. 34 proposed an efficient file hierarchy attribute-based encryption scheme in cloud computing.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/ett.3667">doi:10.1002/ett.3667</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/eu7rs5halbefrmbiipbf6t7c7e">fatcat:eu7rs5halbefrmbiipbf6t7c7e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200307064637/http://usir.salford.ac.uk/id/eprint/51581/8/Analysis_of_Attribute_Based_Cryptographic_Techniques_and_Their_Application_to_Protect_Cloud_Services__Final%20Version.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/13/cf/13cff7afb6f45b1c11b20405bbd367a13ef81a5b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/ett.3667"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> wiley.com </button> </a>

Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks

Changhee Hahn, Hyunsoo Kwon, Junbeom Hur
<span title="">2016</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/khqygtfojnby3jyh5obuwd7ko4" style="color: black;">Mobile Information Systems</a> </i> &nbsp;
The proposed scheme guarantees a hidden policy, constant-sized ciphertexts, and traces, with security analyses.  ...  In this paper, we propose an efficient attribute-based secure data sharing scheme in mHealth.  ...  In terms of computational cost, the constant-sized ciphertext scheme [23] shows the best encryption phase efficiency, requiring a constant number of exponentiations.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2016/6545873">doi:10.1155/2016/6545873</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/x64vnqiwo5fq5m7xbkxwjhpimu">fatcat:x64vnqiwo5fq5m7xbkxwjhpimu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190504174524/http://downloads.hindawi.com/journals/misy/2016/6545873.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/91/52/9152bbdfe9ac83a8a80a511cc81fa9407232722c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2016/6545873"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

CUPS: Secure opportunistic cloud of things framework based on attribute‐based encryption scheme supporting access policy update

Sana Belguith, Nesrine Kaaniche, Giovanni Russello
<span title="2019-09-02">2019</span> <i title="Wiley"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/h3c3kyyl7ffr5gt3w57uk7qlty" style="color: black;">Security and Privacy</a> </i> &nbsp;
Attribute Based Encryption is a promising cryptographic mechanism suitable for distributed environments, providing flexible access control to encrypted data contents.  ...  However, it imposes high decryption costs, and does not support access policy update, for highly dynamic environments.  ...  To save the storage cost of ciphertext and processing overhead of encryption, attribute based encryption schemes with constant ciphertext size have been introduced 36, 37, 38, 39 .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/spy2.85">doi:10.1002/spy2.85</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vzew5iosffekpcduhdkeexb64u">fatcat:vzew5iosffekpcduhdkeexb64u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200306032718/http://usir.salford.ac.uk/id/eprint/51592/1/CUPS%20Final%20Version.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/46/54/4654641828e5818ef5072c870bf34d01a0bf606d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/spy2.85"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> wiley.com </button> </a>

Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT

Sana Belguith, Nesrine Kaaniche, Giovanni Russello
<span title="">2018</span> <i title="SCITEPRESS - Science and Technology Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/7bjbs63oxffftcpgw45mwyavke" style="color: black;">Proceedings of the 15th International Joint Conference on e-Business and Telecommunications</a> </i> &nbsp;
Third, ciphertexts received by the end-user are constant sized and independent from the number of attributes used in the access policy which affords low communication and storage costs.  ...  In this paper, we design PU-ABE, a new variant of key policy attribute based encryption supporting efficient access policy update that captures attributes addition and revocation to access policies.  ...  and Employment (MBIE), New Zealand.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5220/0006854603010312">doi:10.5220/0006854603010312</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icete/BelguithKR18.html">dblp:conf/icete/BelguithKR18</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fxzcf6r55zcl3prcdljwbudqqe">fatcat:fxzcf6r55zcl3prcdljwbudqqe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190427094850/http://usir.salford.ac.uk/id/eprint/50015/2/_SECRYPT_2018_PU_ABE__Lightweight_Attribute_Based_Encryption_Supporting_Access_Policy_Update_for_Cloud_Assitsed_IoT.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b3/d7/b3d7f55474606400a3e3e0702e5b902768c894b1.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5220/0006854603010312"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Survey on Ciphertext-Policy Attribute-based Encryption (CP-ABE) Approaches to Data Security on Mobile Devices and its Application to IoT

Steve Moffat, Mohammad Hammoudeh, Robert Hegarty
<span title="">2017</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/gvfsqa2u7ffjroev4rxszqd3oy" style="color: black;">Proceedings of the International Conference on Future Networks and Distributed Systems - ICFNDS &#39;17</a> </i> &nbsp;
Due to the sheer volume of research, the survey has focused on one aspect of ABE -Ciphertext-Policy Attribute-Based Encryption -in line with its prominence in ABE in MCC research to date.  ...  ABE is a type of role-based access control encryption solution which allows data owners and data consumers or users to encrypt and decrypt based on their personal attributes (e.g. department, location,  ...  pre-decryption and then decryption to distribute computation costs (5) Constant-size ciphertexts: Limiting the computation impact of extensive attribute lists defining the access policy through constant-size  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3102304.3102338">doi:10.1145/3102304.3102338</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icfnds/MoffatHH17.html">dblp:conf/icfnds/MoffatHH17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5jls5fu3nrdybnmwotrcpsn6ai">fatcat:5jls5fu3nrdybnmwotrcpsn6ai</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200309142418/https://e-space.mmu.ac.uk/619271/1/MMU%20Survey%20on%20CP-ABE%20MCC%20and%20IoT%20vACM%20%282%29.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1a/6b/1a6bcc7fd09d0e8834f3b2d8bab1712cea540c04.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3102304.3102338"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Cryptanalysis and Improvement on Wang et al.'s Attribute-Based Searchable Encryption Scheme

Yi-Fan Tseng, Department of Computer Science, National Chengchi University, Taipei, Taiwan, Chun-I Fan, Si-Jing Wu, Hsin-Nan Kuo, Jheng-Jia Huang, Sun Yat-sen University, Kaohsiung, Taiwan
<span title="">2019</span> <i title="EJournal Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2uckwik5xjerdg36acn26gjq6e" style="color: black;">International Journal of Machine Learning and Computing</a> </i> &nbsp;
Index Terms-Attribute-based encryption, cryptanalysis, hidden policy, searchable encryption.  ...  Furthermore, we propose a solution to fix the flaws, and the improved scheme also largely reduces the length of the ciphertext such that it is independent of the number of the attributes.  ...  [2] proposed an attribute-based encryption with keyword search (ABKS) [3] - [6] scheme based on ciphertext-policy attribute-based encryption (CP-ABE), which preserves the fine-grained access control  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18178/ijmlc.2019.9.5.851">doi:10.18178/ijmlc.2019.9.5.851</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cd7bvh7ynzbcxorjjqjkkuejay">fatcat:cd7bvh7ynzbcxorjjqjkkuejay</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200321021232/http://www.ijmlc.org/vol9/851-E040.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/37/61/37618fc314034e1d784b3e98e58d04b4cc15ef65.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.18178/ijmlc.2019.9.5.851"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Enabling Efficient Decentralized and Privacy Preserving Data Sharing in Mobile Cloud Computing

Jiawei Zhang, Ning Lu, Teng Li, Jianfeng Ma, Weizhi Meng
<span title="2021-09-02">2021</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6o4hgxplrbehxg4t53ub7zmfha" style="color: black;">Wireless Communications and Mobile Computing</a> </i> &nbsp;
Aiming to protect the security of cloud data sharing against unauthorized accesses, many studies have been conducted for fine-grained access control using ciphertext-policy attribute-based encryption (  ...  Mobile cloud computing (MCC) is embracing rapid development these days and able to provide data outsourcing and sharing services for cloud users with pervasively smart mobile devices.  ...  It is also efficient in encryption cost, user decryption cost, and out decryption cost and has far smaller and constant public parameter size.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2021/8513869">doi:10.1155/2021/8513869</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bvvv2je7kjdpbncuscwuqt3tmm">fatcat:bvvv2je7kjdpbncuscwuqt3tmm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210904144941/https://downloads.hindawi.com/journals/wcmc/2021/8513869.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/5c/64/5c64a02a7a5426db6ad1b0a71b88c7de30307dc7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2021/8513869"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

Towards efficient sharing of encrypted data in cloud-based mobile social network

<span title="2016-04-30">2016</span> <i title="Korean Society for Internet Information (KSII)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/hupfbobgkvepdnt5g32qxkypsy" style="color: black;">KSII Transactions on Internet and Information Systems</a> </i> &nbsp;
However, its ciphertext size and decryption time grow linearly with the attribute numbers in the access structure.  ...  Ciphertext-policy attribute-based encryption (CP-ABE) is currently considered to be a promising security solution for cloud-based mobile social network to encrypt the sensitive data.  ...  Ciphertext-policy attribute-based encryption (CP-ABE) [3] is regarded as a promising technique for access control of encrypted data in cloud computing,which allows the encryption of data by specifying  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3837/tiis.2016.04.024">doi:10.3837/tiis.2016.04.024</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zekwxrozifbl3cxf5o3edqjpku">fatcat:zekwxrozifbl3cxf5o3edqjpku</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200505042149/http://www.itiis.org/digital-library/manuscript/file/21089/TIISVol10No4-24.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/df/1e/df1e66af59a489d026617d0c6c1bffbdba927129.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3837/tiis.2016.04.024"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 1,523 results