Decentralized Attribute-Based Access Control with Attribute Revocation and Outsourced Decryption
F Yang, H Cui, J Jing - 2023 15th International Conference on …, 2023 - ieeexplore.ieee.org
Decentralized ciphertext-policy attribute-based encryption (CP-ABE) is considered a
promising cryptographic primitive to enable fine-grained access control over encrypted data …
promising cryptographic primitive to enable fine-grained access control over encrypted data …
A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing
R Ahuja, SK Mohanty, K Sakurai - Computers & Electrical Engineering, 2017 - Elsevier
The benefits of cloud computing motivate enterprises to migrate their IT infrastructure on
cloud servers. Enterprise needs to entrust untrusted cloud service provider, which gives rise …
cloud servers. Enterprise needs to entrust untrusted cloud service provider, which gives rise …
A framework of multi-authority attribute-based encryption with outsourcing and revocation
SSM Chow - Proceedings of the 21st ACM on symposium on access …, 2016 - dl.acm.org
Attribute-based encryption (ABE) is a cryptographic tool for fine-grained data access control.
For practical needs, an ABE scheme should support multiple authority and revocation …
For practical needs, an ABE scheme should support multiple authority and revocation …
Eracma: Expressive and revocable access control with multi-authority for aiot-enabled human centric consumer electronics
With the maturation of Artificial Intelligence empowered Internet of Things (AIoT) and smart
consumer electronics technology, Securing data privacy has become a top priority concern …
consumer electronics technology, Securing data privacy has become a top priority concern …
Fine-grained access control system based on outsourced attribute-based encryption
As cloud computing becomes prevalent, more and more sensitive data is being centralized
into the cloud for sharing, which brings forth new challenges for outsourced data security …
into the cloud for sharing, which brings forth new challenges for outsourced data security …
Comments on “control cloud data access privilege and anonymity with fully anonymous attribute-based encryption”
H Ma, R Zhang, W Yuan - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
Most of the known attribute-based encryption (ABE) schemes focused on the data contents
privacy and the access control, but less attention was paid to the privilege control and the …
privacy and the access control, but less attention was paid to the privilege control and the …
A survey on multi-authority and decentralized attribute-based encryption
PSK Oberko, VHKS Obeng, H Xiong - Journal of Ambient Intelligence and …, 2022 - Springer
The introduction of attribute-based encryption (ABE) targets to achieve the implementation of
single-to-numerous encryption; however, the sole authority challenge and the issue of …
single-to-numerous encryption; however, the sole authority challenge and the issue of …
Attribute-based encryption with publicly verifiable outsourced decryption
Attribute-based encryption (ABE) is a useful cryptographic primitive for access control and
fine-grained sharing on encrypted data. However, the main drawback of ABE is that the …
fine-grained sharing on encrypted data. However, the main drawback of ABE is that the …
Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things
The term of Internet of Things (IoT) remarkably increases the ubiquity of the internet by
integrating smart object-based infrastructures. How to achieve efficient fine-grained data …
integrating smart object-based infrastructures. How to achieve efficient fine-grained data …
On the Decentralization of Attribute-Based Encryption Schemes
MB Hinojosa-Cabello, RA Aldeco-Perez… - 2023 Mexican …, 2023 - ieeexplore.ieee.org
Nowadays, cloud services are used for outsourcing the high processing and storage
requirements demanded under Internet of Things (IoT) application scenarios. However …
requirements demanded under Internet of Things (IoT) application scenarios. However …