Trustaccess: A trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain

S Gao, G Piao, J Zhu, X Ma, J Ma - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) is widely used in fine-grained access
control to achieve the secure data sharing. However, most of the existing CP-ABE access …

[HTML][HTML] Preserving data privacy in machine learning systems

SZ El Mestari, G Lenzini, H Demirci - Computers & Security, 2024 - Elsevier
The wide adoption of Machine Learning to solve a large set of real-life problems came with
the need to collect and process large volumes of data, some of which are considered …

Fine-grained data access control with attribute-hiding policy for cloud-based IoT

J Hao, C Huang, J Ni, H Rong, M Xian, XS Shen - Computer Networks, 2019 - Elsevier
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising approach to achieve
fine-grained access control over the outsourced data in Internet of Things (IoT). However, in …

Multi-party functional encryption

S Agrawal, R Goyal, J Tomida - Theory of Cryptography Conference, 2021 - Springer
We initiate the study of multi-party functional encryption (MPFE) MPFE) which unifies and
abstracts out various notions of functional encryption which support distributed ciphertexts or …

ABE squared: accurately benchmarking efficiency of attribute-based encryption

A de la Piedra, M Venema, G Alpár - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Measuring efficiency is difficult. In the last decades, several works have contributed in the
quest to successfully determine and compare the efficiency of pairing-based attribute-based …

Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryption

YF Tseng - Computer Standards & Interfaces, 2024 - Elsevier
Predicate encryption is well studied due to its flexibility in supporting fine-grained access
control. In Katz et al.(2018) proposed a predicate encryption for a new predicate family …

Privacy-preserving multi-authority attribute-based data sharing framework for smart grid

L Zhang, J Ren, Y Mu, B Wang - IEEE Access, 2020 - ieeexplore.ieee.org
In smart power grid systems, real-time electricity data sharing can bring many benefits.
However the security and privacy challenges have been a concern. This is because shared …

Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice

M Venema, G Alpár, JH Hoepman - Designs, Codes and Cryptography, 2023 - Springer
Attribute-based encryption (ABE) cryptographically implements fine-grained access control
on data. As such, data can be stored by an entity that is not necessarily trusted to enforce …

Ciphertext-policy attribute-based encryption with hidden sensitive policy from keyword search techniques in smart city

F Meng, L Cheng, M Wang - EURASIP Journal on Wireless …, 2021 - Springer
Countless data generated in Smart city may contain private and sensitive information and
should be protected from unauthorized users. The data can be encrypted by Attribute-based …

Dual traceable distributed attribute-based searchable encryption and ownership transfer

Y Yang, RH Deng, W Guo, H Cheng… - … on Cloud Computing, 2021 - ieeexplore.ieee.org
In this article, we propose d ual t raceable d istributed a ttribute b ased e ncryption with s
ubset k eyword s earch system (DT-DABE-SKS, abbreviated as) to simultaneously realize …