A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Traceable and Retrievable Identity-Based Encryption
[chapter]
Applied Cryptography and Network Security
Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. ...
Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. ...
Acknowledgements We would like to thank the anonymous reviewers of ACNS 2008 for their suggestions and invaluable comments to improve this paper. ...
doi:10.1007/978-3-540-68914-0_6
dblp:conf/acns/AuHLSWY08
fatcat:xirzxnzckra5bpu7tks5h3f4ka
Security and Privacy Sustained Cloud Data Authentication using IDM
2015
International Journal of Science and Research (IJSR)
So a Steganography is introducing in cloud storage centre where the group member encrypt the data and send it to the cloud server, the server receive it and hide it in to an image. ...
Data of the different owners in the group shares data with each other securely and preserving their identity from an untrusted cloud server is one of the challenging issues currently, due to the frequent ...
Before generating a file group member first retrieve the revocation list from the cloud validate it and based on the number of revoked user group member can encrypt the file. ...
doi:10.21275/v4i11.sub159126
fatcat:2fhymi3xfzhqpijsjc4n6ckvlq
A Study on the Public Auditing Mechanisms for Privacy Preserving and Maintaining Data Integrity in Cloud Computing
2016
International Journal of Database Theory and Application
We have presented the advantages and flaws in each mechanism compared to another. ...
The users store their information in remote location with the hope of maintaining the privacy and integrity of data. ...
Acknowledgements We are grateful and thankful to the CARD research system of our college. ...
doi:10.14257/ijdta.2016.9.6.10
fatcat:zuozwxhk45ajdee76jihrrczdq
Privacy-Preserving Attribute-Based Keyword Search with Traceability and Revocation for Cloud-Assisted IoT
2021
Security and Communication Networks
Attribute-based keyword search (ABKS) has been regarded as a promising solution to ensure data confidentiality and fine-grained search control for cloud-assisted IoT. ...
Towards this end, we present a privacy-preserving ABKS that simultaneously supports policy hiding, malicious user traceability, and revocation. ...
Attributed-Based Encryption. ...
doi:10.1155/2021/9929663
fatcat:icundoqwlzesnphuxve6slzncu
Cloud Data Sharing in a Dynamic Group with a Dual Secure Technology
2014
IOSR Journal of Computer Engineering
So a steganography is introducing in cloud storage centre where the group member encrypt the data and send it to the cloud server, the server receive it and hide it in to an image. ...
Data of the different owners in the group shares data with each other securely and preserving their identity from an untrusted cloud server is one of the challenging issues currently, due to the frequent ...
Shiva Kumar G.S, Dept. of Computer Science and Engineering, SIT Mangalore. We also convey our thanks to all the staff members of SIT for helping in the project. ...
doi:10.9790/0661-162107073
fatcat:teuhr62bijeebjvyx4v62iywya
BCST-APTS: Blockchain and CP-ABE Empowered Data Supervision, Sharing, and Privacy Protection Scheme for Secure and Trusted Agricultural Product Traceability System
2022
Security and Communication Networks
We propose a secure and trusted agricultural product traceability system (BCST-APTS), which is supported by blockchain and CP-ABE encryption technology. ...
Furthermore, a reencryption scheme based on ciphertext-policy attribute encryption (RE-CP-ABE) is proposed, which can meet the needs of efficient supervision and sharing of ciphertext data. ...
For example, the data issuer retrieves the attributes used for data encryption, and when the authoritative organization works in place of the CA, it can generate encryption keys based on the data issuer ...
doi:10.1155/2022/2958963
fatcat:jftt2mz76vcdrffhx75f3fq7fe
Large Universe CP-ABE With Whitebox Traceability
2016
International Journal on Cybernetics & Informatics
KEYWORDS Attribute-based encryption,ciphertext-policy,large universe ,white-box traceability,malicious user. ...
In a ciphertext-policy attribute-based encryption (CP-ABE) system, decryption keys are defined over attributes shared by multiple users. ...
Sahai and Waters introduced the notion of Fuzzy Identity-Based Encryption[36]. ...
doi:10.5121/ijci.2016.5222
fatcat:dw5j5gnot5dqfnjasnez6wbxty
A Review on Cloud Data Security and its Mitigation Techniques
2015
Procedia Computer Science
Cloud users are allowed to store their data in cloud server using cloud storage and reduce the burden of storing and retrieving in local machine. ...
In this paper, the methodologies as encryption based methods and auditability schemes are used. ...
Traceability A group manager can open signature on some special situation and trace the issue related to user. Tracing can be categorized into two ways, data traceability and operation traceability. ...
doi:10.1016/j.procs.2015.04.192
fatcat:tawpw3p2izhc3elenwn5c23aai
Improving Security of Traceable White-Box CPABE with TTP Access Control
2015
International Journal of Science and Research (IJSR)
Various encryption schemes have gained popularity for secure transmission of data. CPABE (Ciphertext Policy Attribute Based Encryption) is one among such schemes. ...
The decryption rights are generated based on the attributes of user. Traceability is the property by which the malicious users who intentionally try to leak the data are traced. ...
Related Work
CPABE Ciphertext Policy Attribute Based Encryption is an encryption method which uses policies of user to generate encryption and decryption keys. ...
doi:10.21275/v4i11.nov151381
fatcat:o7m2yjh4xrgaphpa2vls3rtoj4
An Efficient Public Auditing with Privacy Preserving Identity and Traceability
2016
International Journal of Computer Applications
This paper proposed architecture for privacy preservation and traceability. The implementation results represent that our method is suitable for large organizations. ...
Since these data-centers may be located in any part of the world beyond the reach and control of users, there are multifarious security and privacy challenges that need to be understood and addressed. ...
Most of the encryption technique regarding encryption for cloud-based database services are inappropriate to the database prototype. ...
doi:10.5120/ijca2016911499
fatcat:gtgaymzuizbgjpdyzk4xb5qmuy
A Survey on Identity-Based Authenticated and Efficient Traceable Search System
2018
IJARCCE
Secure search over encrypted remote data is crucial in cloud computing to ensure the data privacy and usability. ...
The key escrow free mechanism can be used which will effectively prevent the Key Generation Centre (KGC) from unscrupulously searching and decrypting all encrypted files of users. ...
CONCLUSION AND FUTURE WORK This dissertation proposed a novel method Identity-based Authenticated and Efficient Traceable Search System for Secure Cloud Storage. ...
doi:10.17148/ijarcce.2018.7106
fatcat:pxtkeczkrndu3j3zqkiknesure
Lightweight Sharable and Traceable Secure Mobile Health System
2017
IEEE Transactions on Dependable and Secure Computing
In this paper, we propose a Lightweight Sharable and Traceable (LiST) secure mobile health system in which patient data are encrypted end-to-end from a patient's mobile device to data users. ...
then uploading the encrypted data to the cloud for storage and access by healthcare staff and researchers. ...
Data Retrieval Receiving the data retrieval request from data user, the public cloud server responds on the request and searches on the stored encrypted EHRs to look for matching files. ...
doi:10.1109/tdsc.2017.2729556
fatcat:74cfh2ury5gztm2r6r4hxo46e4
A Survey on the Applications of Blockchains in Security of IoT Systems
[article]
2021
arXiv
pre-print
A critical concern is the security and integrity of such a complex platform to ensure the sustainability and reliability of these IoT-based systems. ...
Blockchain is an emerging technology that has demonstrated its unique features and capabilities for different problems and application domains including IoT-based systems. ...
Furthermore, the traceability aspect incorporates information assigned to the product related to its identity, processing, and usefulness [15] . ...
arXiv:2112.09296v1
fatcat:bempf3xzrjb7hc5zngmliyqgbe
An efficient traceable access control scheme with reliable key delegation in mobile cloud computing
2016
EURASIP Journal on Wireless Communications and Networking
Secondly, a new type of re-encryption method is proposed, which is based on an intuitive method that supports any monotonic access tree instead of the re-encryption key. ...
Firstly, we present a traceable CP-ABE system and realize key delegation without loss of traceability. ...
Related work Attribute-based encryption (ABE) is firstly proposed by Sahai and Brent in [12] . ...
doi:10.1186/s13638-016-0705-2
fatcat:7ogt2jujcrcl3bt2ybsyqpzs2q
Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System
2021
KSII Transactions on Internet and Information Systems
In the system of ciphertext policy attribute-based encryption (CP-ABE), only when the attributes of data user meets the access structure established by the encrypter, the data user can perform decryption ...
and supports arbitrary monotonous access structures. ...
Related Work ABE is evolved from fuzzy identity-based encryption [15] . After that, many ABE schemes were put forward to improve performance and security. ...
doi:10.3837/tiis.2021.01.017
fatcat:xoh5m75bnjf5ppvxi34izfazra
« Previous
Showing results 1 — 15 out of 3,200 results