Enhancing attribute-based encryption with attribute hierarchy

J Li, Q Wang, C Wang, K Ren - Mobile networks and applications, 2011 - Springer
Attribute-based encryption (ABE) has been envisioned as a promising cryptographic
primitive for realizing secure and flexible access control. However, ABE is being criticized for …

Defending against key abuse attacks in KP-ABE enabled broadcast systems

S Yu, K Ren, W Lou, J Li - … and Privacy in Communication Networks: 5th …, 2009 - Springer
Abstract Key-Policy Attribute-Based Encryption (KP-ABE) is a promising cryptographic
primitive which enables fine-grained access control over sensitive data. However, key abuse …

A lightweight policy preserving EHR sharing scheme in the cloud

Z Ying, L Wei, Q Li, X Liu, J Cui - IEEE Access, 2018 - ieeexplore.ieee.org
Electronic Health Record (EHR) is a digital health documentary. It contains not only the
health-related records but also the personal sensitive information. Therefore, how to reliably …

Privacy-aware attribute-based PHR sharing with user accountability in cloud computing

F Xhafa, J Feng, Y Zhang, X Chen, J Li - The Journal of Supercomputing, 2015 - Springer
As an emerging patient-centric model of health information exchange, personal health
record (PHR) is often outsourced to be stored at a third party. The value of PHR data is its …

Eyeing your exposure: quantifying and controlling information sharing for improved privacy

R Schlegel, A Kapadia, AJ Lee - … of the Seventh Symposium on Usable …, 2011 - dl.acm.org
A large body of research has focused on disclosure policies for controlling information
release in social sharing (eg, location-based) applications. However, less work has …

Match me if you can: matchmaking encryption and its applications

G Ateniese, D Francati, D Nunez, D Venturi - Journal of Cryptology, 2021 - Springer
We introduce a new form of encryption that we name matchmaking encryption (ME). Using
ME, sender S and receiver R (each with its own attributes) can both specify policies the other …

Efficient ciphertext-policy attribute based encryption with hidden policy

X Li, D Gu, Y Ren, N Ding, K Yuan - … Fujian, China, November 21-23, 2012 …, 2012 - Springer
In an anonymous ciphertext-policy attribute-based encryption (CP-ABE) scheme, the
encryptor-specified access structure is hidden in ciphertexts. The decryptor gets his secret …

[图书][B] New directions of modern cryptography

Z Chao - 2012 - books.google.com
Modern cryptography has evolved dramatically since the 1970s. With the rise of new
network architectures and services, the field encompasses much more than traditional …

EC-SVC: Secure CAN bus in-vehicle communications with fine-grained access control based on edge computing

D Yu, RH Hsu, J Lee, S Lee - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
In-vehicle communications are not designed for message exchange between the vehicles
and outside systems originally. Thus, the security design of message protection is …

Ciphertext-policy attribute-based encryption with hidden access policy and testing

J Li, H Wang, Y Zhang, J Shen - KSII Transactions on Internet and …, 2016 - koreascience.kr
In ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user's secret key is
associated with a set of attributes, and the ciphertext is associated with an access policy …