Enhancing attribute-based encryption with attribute hierarchy
Attribute-based encryption (ABE) has been envisioned as a promising cryptographic
primitive for realizing secure and flexible access control. However, ABE is being criticized for …
primitive for realizing secure and flexible access control. However, ABE is being criticized for …
Defending against key abuse attacks in KP-ABE enabled broadcast systems
Abstract Key-Policy Attribute-Based Encryption (KP-ABE) is a promising cryptographic
primitive which enables fine-grained access control over sensitive data. However, key abuse …
primitive which enables fine-grained access control over sensitive data. However, key abuse …
A lightweight policy preserving EHR sharing scheme in the cloud
Electronic Health Record (EHR) is a digital health documentary. It contains not only the
health-related records but also the personal sensitive information. Therefore, how to reliably …
health-related records but also the personal sensitive information. Therefore, how to reliably …
Privacy-aware attribute-based PHR sharing with user accountability in cloud computing
As an emerging patient-centric model of health information exchange, personal health
record (PHR) is often outsourced to be stored at a third party. The value of PHR data is its …
record (PHR) is often outsourced to be stored at a third party. The value of PHR data is its …
Eyeing your exposure: quantifying and controlling information sharing for improved privacy
A large body of research has focused on disclosure policies for controlling information
release in social sharing (eg, location-based) applications. However, less work has …
release in social sharing (eg, location-based) applications. However, less work has …
Match me if you can: matchmaking encryption and its applications
We introduce a new form of encryption that we name matchmaking encryption (ME). Using
ME, sender S and receiver R (each with its own attributes) can both specify policies the other …
ME, sender S and receiver R (each with its own attributes) can both specify policies the other …
Efficient ciphertext-policy attribute based encryption with hidden policy
In an anonymous ciphertext-policy attribute-based encryption (CP-ABE) scheme, the
encryptor-specified access structure is hidden in ciphertexts. The decryptor gets his secret …
encryptor-specified access structure is hidden in ciphertexts. The decryptor gets his secret …
[图书][B] New directions of modern cryptography
Z Chao - 2012 - books.google.com
Modern cryptography has evolved dramatically since the 1970s. With the rise of new
network architectures and services, the field encompasses much more than traditional …
network architectures and services, the field encompasses much more than traditional …
EC-SVC: Secure CAN bus in-vehicle communications with fine-grained access control based on edge computing
In-vehicle communications are not designed for message exchange between the vehicles
and outside systems originally. Thus, the security design of message protection is …
and outside systems originally. Thus, the security design of message protection is …
Ciphertext-policy attribute-based encryption with hidden access policy and testing
In ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user's secret key is
associated with a set of attributes, and the ciphertext is associated with an access policy …
associated with a set of attributes, and the ciphertext is associated with an access policy …