Attribute based encryption in cloud computing: A survey, gap analysis, and future directions
P Kumar, PJA Alphonse - Journal of Network and Computer Applications, 2018 - Elsevier
Cloud computing facilitates to store and access the data remotely over the internet.
However, storing the data in the untrusted cloud server leads the privacy and access control …
However, storing the data in the untrusted cloud server leads the privacy and access control …
[PDF][PDF] A survey on secure cloud: security and privacy in cloud computing
SN Kumar, A Vajpayee - American Journal of Systems and …, 2016 - researchgate.net
Cloud computing is an emerging technology that is still unclear to many security problems.
The security problem becomes amplified under the cloud model as new dimensions enter …
The security problem becomes amplified under the cloud model as new dimensions enter …
Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size keys and ciphertexts
Designing lightweight security protocols for cloud-based Internet-of-Things (IoT) applications
for battery-limited mobile devices, such as smart phones and laptops, is a topic of recent …
for battery-limited mobile devices, such as smart phones and laptops, is a topic of recent …
Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment
Ciphertext-policy attribute-based encryption (CP-ABE) scheme can be deployed in a mobile
cloud environment to ensure that data outsourced to the cloud will be protected from …
cloud environment to ensure that data outsourced to the cloud will be protected from …
Design of a new CP‐ABE with constant‐size secret keys for lightweight devices using elliptic curve cryptography
The energy cost of public‐key cryptography is a vital component of modern secure
communications. It inhibits the widespread adoption within the ultra‐low energy regimes (for …
communications. It inhibits the widespread adoption within the ultra‐low energy regimes (for …
Efficient escrow-free CP-ABE with constant size ciphertext and secret key for big data storage in cloud
PK Premkamal, SK Pasupuleti… - International Journal of …, 2020 - igi-global.com
Ciphertext-policy attribute-based encryption (CP-ABE) schemes are an appropriate
cryptographic technique to enable privacy along with access control in the cloud, but the …
cryptographic technique to enable privacy along with access control in the cloud, but the …
Ciphertext-policy attribute-based encryption with hidden access policy and testing
In ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user's secret key is
associated with a set of attributes, and the ciphertext is associated with an access policy …
associated with a set of attributes, and the ciphertext is associated with an access policy …
Dynamic attribute-based signcryption without random oracles
In SCN2010, Gagné, Narayan, and Safavi-Naini proposed attribute-based signcryption
(ABSC) with threshold structure. As in ciphertext-policy attribute-based encryption (CP-ABE) …
(ABSC) with threshold structure. As in ciphertext-policy attribute-based encryption (CP-ABE) …
A survey of research progress and development tendency of attribute‐based encryption
L Pang, J Yang, Z Jiang - The Scientific World Journal, 2014 - Wiley Online Library
With the development of cryptography, the attribute‐based encryption (ABE) draws
widespread attention of the researchers in recent years. The ABE scheme, which belongs to …
widespread attention of the researchers in recent years. The ABE scheme, which belongs to …
Recipient anonymous ciphertext-policy attribute based encryption
YS Rao, R Dutta - … Systems Security: 9th International Conference, ICISS …, 2013 - Springer
Abstract Attribute Based Encryption (ABE) is a promising and increasingly versatile
paradigm. Given the many potential uses of ABE schemes, constructing efficient schemes …
paradigm. Given the many potential uses of ABE schemes, constructing efficient schemes …