Privacy-aware attribute-based PHR sharing with user accountability in cloud computing
As an emerging patient-centric model of health information exchange, personal health
record (PHR) is often outsourced to be stored at a third party. The value of PHR data is its …
record (PHR) is often outsourced to be stored at a third party. The value of PHR data is its …
A CP-ABE scheme with hidden policy and its application in cloud computing
With flexible and scalable features for fine-grained access control, ciphertext policy attribute-
based encryption (CP-ABE) is widely used as a kind of data protection mechanism in cloud …
based encryption (CP-ABE) is widely used as a kind of data protection mechanism in cloud …
[HTML][HTML] 基于访问树的策略隐藏属性加密方案
宋衍, 韩臻, 刘凤梅, 刘磊 - 通信学报, 2015 - infocomm-journal.com
已有的策略隐藏属性加密(ABE, attribute-based encryption) 方案只支持受限的访问结构,
策略表达能力弱, 基于此提出一种新的访问树结构, 使属性隐藏和秘密共享能够应用到“与” …
策略表达能力弱, 基于此提出一种新的访问树结构, 使属性隐藏和秘密共享能够应用到“与” …
Secure and efficient fine-grained data access control scheme in cloud computing1
Cloud computing, which provides quite inexpensive and dynamically scalable computing
services via network and communication infrastructures, is increasingly important for future …
services via network and communication infrastructures, is increasingly important for future …
Ciphertext-policy attribute-based encryption with hiding access structure
UC Yadav - 2015 IEEE International Advance Computing …, 2015 - ieeexplore.ieee.org
Ciphertext-policy attribute based encryption (CP-ABE) is becoming very significant in
distributed computing environment. Distributed computing environment is very popular way …
distributed computing environment. Distributed computing environment is very popular way …
Ciphertext policy-hiding attribute-based encryption
UC Yadav, ST Ali - 2015 International Conference on Advances …, 2015 - ieeexplore.ieee.org
Ciphertext-policy attribute based encryption (CPABE) is becoming very important in
distributed computing environment, because it makes easier to protect, broadcast and …
distributed computing environment, because it makes easier to protect, broadcast and …
On anonymous attribute based encryption
Abstract Attribute Based Encryption (ABE) has found enormous scope in data confidentiality
and fine-grained access control of shared data stored in public cloud. Classical ABE …
and fine-grained access control of shared data stored in public cloud. Classical ABE …
Policy privacy in cryptographic access control
Cryptographic access control offers selective access to encrypted data via a combination of
key management and functionality-rich cryptographic schemes, such as attribute-based …
key management and functionality-rich cryptographic schemes, such as attribute-based …
A revocable attribute based data sharing scheme resilient to DoS attacks in smart grid
Modern power systems have been faced with a rising appeal for the upgrade to a highly
intelligent generation of electricity networks known as the smart grid. Thus, security for the …
intelligent generation of electricity networks known as the smart grid. Thus, security for the …
Privacy-preserving attribute based searchable encryption
P Chaudhari, M Das - Cryptology ePrint Archive, 2015 - eprint.iacr.org
Abstract Attribute Based Encryption (ABE) is a promising public-key cryptographic primitive
that can be used for cryptographically enforced access control in untrusted storage. Storing …
that can be used for cryptographically enforced access control in untrusted storage. Storing …