Decentralized Attribute-Based Access Control with Attribute Revocation and Outsourced Decryption

F Yang, H Cui, J Jing - 2023 15th International Conference on …, 2023 - ieeexplore.ieee.org
Decentralized ciphertext-policy attribute-based encryption (CP-ABE) is considered a
promising cryptographic primitive to enable fine-grained access control over encrypted data …

A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing

R Ahuja, SK Mohanty, K Sakurai - Computers & Electrical Engineering, 2017 - Elsevier
The benefits of cloud computing motivate enterprises to migrate their IT infrastructure on
cloud servers. Enterprise needs to entrust untrusted cloud service provider, which gives rise …

A framework of multi-authority attribute-based encryption with outsourcing and revocation

SSM Chow - Proceedings of the 21st ACM on symposium on access …, 2016 - dl.acm.org
Attribute-based encryption (ABE) is a cryptographic tool for fine-grained data access control.
For practical needs, an ABE scheme should support multiple authority and revocation …

Eracma: Expressive and revocable access control with multi-authority for aiot-enabled human centric consumer electronics

Y Zhuang, C Wang, W Zheng, N Victor… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
With the maturation of Artificial Intelligence empowered Internet of Things (AIoT) and smart
consumer electronics technology, Securing data privacy has become a top priority concern …

Fine-grained access control system based on outsourced attribute-based encryption

J Li, X Chen, J Li, C Jia, J Ma, W Lou - … Egham, UK, September 9-13, 2013 …, 2013 - Springer
As cloud computing becomes prevalent, more and more sensitive data is being centralized
into the cloud for sharing, which brings forth new challenges for outsourced data security …

Comments on “control cloud data access privilege and anonymity with fully anonymous attribute-based encryption”

H Ma, R Zhang, W Yuan - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
Most of the known attribute-based encryption (ABE) schemes focused on the data contents
privacy and the access control, but less attention was paid to the privilege control and the …

A survey on multi-authority and decentralized attribute-based encryption

PSK Oberko, VHKS Obeng, H Xiong - Journal of Ambient Intelligence and …, 2022 - Springer
The introduction of attribute-based encryption (ABE) targets to achieve the implementation of
single-to-numerous encryption; however, the sole authority challenge and the issue of …

Attribute-based encryption with publicly verifiable outsourced decryption

H Zheng, J Shao, G Wei, L Hu, B Pan, K Liu… - Network and System …, 2019 - Springer
Attribute-based encryption (ABE) is a useful cryptographic primitive for access control and
fine-grained sharing on encrypted data. However, the main drawback of ABE is that the …

Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things

Q Han, Y Zhang, H Li - Future Generation Computer Systems, 2018 - Elsevier
The term of Internet of Things (IoT) remarkably increases the ubiquity of the internet by
integrating smart object-based infrastructures. How to achieve efficient fine-grained data …

On the Decentralization of Attribute-Based Encryption Schemes

MB Hinojosa-Cabello, RA Aldeco-Perez… - 2023 Mexican …, 2023 - ieeexplore.ieee.org
Nowadays, cloud services are used for outsourcing the high processing and storage
requirements demanded under Internet of Things (IoT) application scenarios. However …