Efficient CCA2 secure revocable multi-authority large-universe attribute-based encryption
D Li, J Chen, J Liu, Q Wu, W Liu - … Symposium, CSS 2017, Xi'an China …, 2017 - Springer
We propose an efficient revocable multi-authority large-universe attribute-based encryption
system deployed to cloud storage service, which supports multiple authorities issuing secret …
system deployed to cloud storage service, which supports multiple authorities issuing secret …
Revocable large universe decentralized multi-authority attribute-based encryption without key abuse for cloud-aided iot
K Huang - IEEE Access, 2021 - ieeexplore.ieee.org
Data confidentiality and access control are the key technologies of secure Internet of things
(IoT) since the circulated application data on multiple different domains in IoT are generally …
(IoT) since the circulated application data on multiple different domains in IoT are generally …
Privacy-preserving multi-authority ciphertext-policy attribute-based encryption with revocation
H Ma, E Dong, Z Liu, L Zhang - … and Applications: Proceedings of the 12th …, 2018 - Springer
Multi-authority attribute-based encryption (ABE) scheme can support the flexible fine-
grained sharing of encrypted data and solve a completely trust problem about a single …
grained sharing of encrypted data and solve a completely trust problem about a single …
[PDF][PDF] Directly Revocable and Verifiable Key-Policy Attribute-based Encryption for Large Universe.
H Ma, T Peng, Z Liu - Int. J. Netw. Secur., 2017 - academia.edu
For practical data sharing applications, many attributebased encryption (ABE) schemes
were proposed with different kinds of properties, such as supporting large universe …
were proposed with different kinds of properties, such as supporting large universe …
New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems
We propose a new large-universe multi-authority ciphertext-policy attribute-based
encryption system. In this system, any string can be used as an attribute of the system, and …
encryption system. In this system, any string can be used as an attribute of the system, and …
Multi-authority attribute-based encryption with user revocation and outsourcing decryption
X Zhang, Y Chen, X Yan, H Jia - Journal of Physics: Conference …, 2019 - iopscience.iop.org
Attribute based encryption scheme is widely used to share sensitive data in cloud storage
environment because it can realize fine-grained access control. Aiming at the problem of …
environment because it can realize fine-grained access control. Aiming at the problem of …
(Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance
B Qin, Q Zhao, D Zheng, H Cui - Information Sciences, 2019 - Elsevier
Attribute-based encryption (ABE) is a promising approach that enables scalable access
control on encrypted data. However, one of the main efficiency drawbacks of ABE is the lack …
control on encrypted data. However, one of the main efficiency drawbacks of ABE is the lack …
Server-aided revocable attribute-based encryption revised: Multi-user setting and fully secure
L Cheng, F Meng - Computer Security–ESORICS 2021: 26th European …, 2021 - Springer
Attribute-based encryption (ABE) is a promising cryptographic primitive achieving fine-
grained access control on encrypted data. However, efficient user revocation is always …
grained access control on encrypted data. However, efficient user revocation is always …
Server-aided revocable attribute-based encryption
As a one-to-many public key encryption system, attribute-based encryption (ABE) enables
scalable access control over encrypted data in cloud storage services. However, efficient …
scalable access control over encrypted data in cloud storage services. However, efficient …
Fully secure unbounded revocable key-policy attribute-based encryption scheme
C Wang, J Fang, J Xie - Security, Privacy, and Anonymity in Computation …, 2016 - Springer
Attribute-based encryption (ABE) is a promising cryptographic primitive which can provide
fine-grained access control over encrypted data. Providing an efficient revocation …
fine-grained access control over encrypted data. Providing an efficient revocation …