Privacy-aware attribute-based PHR sharing with user accountability in cloud computing

F Xhafa, J Feng, Y Zhang, X Chen, J Li - The Journal of Supercomputing, 2015 - Springer
As an emerging patient-centric model of health information exchange, personal health
record (PHR) is often outsourced to be stored at a third party. The value of PHR data is its …

A CP-ABE scheme with hidden policy and its application in cloud computing

R Xu, B Lang - International Journal of Cloud Computing, 2015 - inderscienceonline.com
With flexible and scalable features for fine-grained access control, ciphertext policy attribute-
based encryption (CP-ABE) is widely used as a kind of data protection mechanism in cloud …

[HTML][HTML] 基于访问树的策略隐藏属性加密方案

宋衍, 韩臻, 刘凤梅, 刘磊 - 通信学报, 2015 - infocomm-journal.com
已有的策略隐藏属性加密(ABE, attribute-based encryption) 方案只支持受限的访问结构,
策略表达能力弱, 基于此提出一种新的访问树结构, 使属性隐藏和秘密共享能够应用到“与” …

Secure and efficient fine-grained data access control scheme in cloud computing1

C Yang, J Ye - Journal of High Speed Networks, 2015 - content.iospress.com
Cloud computing, which provides quite inexpensive and dynamically scalable computing
services via network and communication infrastructures, is increasingly important for future …

Ciphertext-policy attribute-based encryption with hiding access structure

UC Yadav - 2015 IEEE International Advance Computing …, 2015 - ieeexplore.ieee.org
Ciphertext-policy attribute based encryption (CP-ABE) is becoming very significant in
distributed computing environment. Distributed computing environment is very popular way …

Ciphertext policy-hiding attribute-based encryption

UC Yadav, ST Ali - 2015 International Conference on Advances …, 2015 - ieeexplore.ieee.org
Ciphertext-policy attribute based encryption (CPABE) is becoming very important in
distributed computing environment, because it makes easier to protect, broadcast and …

On anonymous attribute based encryption

P Chaudhari, ML Das, A Mathuria - … 2015, Kolkata, India, December 16-20 …, 2015 - Springer
Abstract Attribute Based Encryption (ABE) has found enormous scope in data confidentiality
and fine-grained access control of shared data stored in public cloud. Classical ABE …

Policy privacy in cryptographic access control

AL Ferrara, G Fachsbauer, B Liu… - 2015 IEEE 28th …, 2015 - ieeexplore.ieee.org
Cryptographic access control offers selective access to encrypted data via a combination of
key management and functionality-rich cryptographic schemes, such as attribute-based …

A revocable attribute based data sharing scheme resilient to DoS attacks in smart grid

M Bayat, HR Arkian, MR Aref - Wireless Networks, 2015 - Springer
Modern power systems have been faced with a rising appeal for the upgrade to a highly
intelligent generation of electricity networks known as the smart grid. Thus, security for the …

Privacy-preserving attribute based searchable encryption

P Chaudhari, M Das - Cryptology ePrint Archive, 2015 - eprint.iacr.org
Abstract Attribute Based Encryption (ABE) is a promising public-key cryptographic primitive
that can be used for cryptographically enforced access control in untrusted storage. Storing …