Trustaccess: A trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain
Ciphertext-policy attribute-based encryption (CP-ABE) is widely used in fine-grained access
control to achieve the secure data sharing. However, most of the existing CP-ABE access …
control to achieve the secure data sharing. However, most of the existing CP-ABE access …
[HTML][HTML] Preserving data privacy in machine learning systems
The wide adoption of Machine Learning to solve a large set of real-life problems came with
the need to collect and process large volumes of data, some of which are considered …
the need to collect and process large volumes of data, some of which are considered …
Fine-grained data access control with attribute-hiding policy for cloud-based IoT
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising approach to achieve
fine-grained access control over the outsourced data in Internet of Things (IoT). However, in …
fine-grained access control over the outsourced data in Internet of Things (IoT). However, in …
Multi-party functional encryption
We initiate the study of multi-party functional encryption (MPFE) MPFE) which unifies and
abstracts out various notions of functional encryption which support distributed ciphertexts or …
abstracts out various notions of functional encryption which support distributed ciphertexts or …
ABE squared: accurately benchmarking efficiency of attribute-based encryption
Measuring efficiency is difficult. In the last decades, several works have contributed in the
quest to successfully determine and compare the efficiency of pairing-based attribute-based …
quest to successfully determine and compare the efficiency of pairing-based attribute-based …
Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryption
YF Tseng - Computer Standards & Interfaces, 2024 - Elsevier
Predicate encryption is well studied due to its flexibility in supporting fine-grained access
control. In Katz et al.(2018) proposed a predicate encryption for a new predicate family …
control. In Katz et al.(2018) proposed a predicate encryption for a new predicate family …
Privacy-preserving multi-authority attribute-based data sharing framework for smart grid
L Zhang, J Ren, Y Mu, B Wang - IEEE Access, 2020 - ieeexplore.ieee.org
In smart power grid systems, real-time electricity data sharing can bring many benefits.
However the security and privacy challenges have been a concern. This is because shared …
However the security and privacy challenges have been a concern. This is because shared …
Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
Attribute-based encryption (ABE) cryptographically implements fine-grained access control
on data. As such, data can be stored by an entity that is not necessarily trusted to enforce …
on data. As such, data can be stored by an entity that is not necessarily trusted to enforce …
Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart city
F Meng, L Cheng, M Wang - EURASIP Journal on Wireless …, 2021 - Springer
Countless data generated in Smart city may contain private and sensitive information and
should be protected from unauthorized users. The data can be encrypted by Attribute-based …
should be protected from unauthorized users. The data can be encrypted by Attribute-based …
Dual traceable distributed attribute-based searchable encryption and ownership transfer
In this article, we propose d ual t raceable d istributed a ttribute b ased e ncryption with s
ubset k eyword s earch system (DT-DABE-SKS, abbreviated as) to simultaneously realize …
ubset k eyword s earch system (DT-DABE-SKS, abbreviated as) to simultaneously realize …