Flexible attribute-based encryption applicable to secure e-healthcare records

B Qin, H Deng, Q Wu, J Domingo-Ferrer… - International Journal of …, 2015 - Springer
In e-healthcare record systems (EHRS), attribute-based encryption (ABE) appears as a natural
way to achieve fine-grained access control on health records. Some proposals exploit key…

White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes

J Ning, X Dong, Z Cao, L Wei… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) enables fine-grained access control
to the encrypted data for commercial applications. There has been significant progress in CP-…

The lord of the shares: Combining attribute-based encryption and searchable encryption for flexible data sharing

A Michalas - Proceedings of the 34th ACM/SIGAPP symposium on …, 2019 - dl.acm.org
… Having identified both the advantages and the disadvantages of Symmetric Searchable
Encryption and Attribute-Based Encryption schemes we propose a protocol that allows users of …

HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing

Z Wan, J Liu, RH Deng - IEEE transactions on information …, 2011 - ieeexplore.ieee.org
attribute-based encryption (ABE) … , flexible, and fine-grained access control of outsourced
data in cloud computing, in this paper, we propose hierarchical attribute-set-based encryption (…

Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits

M MahdaviOliaee, Z Ahmadian - Journal of Computer Virology and …, 2023 - Springer
… We also define the concept of hidden result attribute based encryption (HR-ABE) which
means that the result of the arithmetic function will not be revealed to the users. We define a new …

Flexible and fine-grained attribute-based data storage in cloud computing

J Li, W Yao, Y Zhang, H Qian… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
… fine-grained file access control, attribute based encryption (ABE) was proposed and used
in … In this article, we provide a ciphertextpolicy attribute based encryption (CP-ABE) scheme …

Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems

F Zhao, T Nishide, K Sakurai - International Conference on Information …, 2011 - Springer
… [10] apply the attribute-based encryption (ABE) to manage the sharing of encrypted data.
Detailed comparison of our scheme with these previous works will be discussed in the last …

PH-MG-ABE: A flexible policy-hidden multi-group attribute-based encryption scheme for secure cloud storage

J Li, E Zhang, J Han, Y Zhang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
… Abstract—Ciphertext-policy attribute-based encryption (CPABE) has attracted significant …
In this paper, we propose a flexible policy-hidden multi-group attribute-based encryption (PH-…

Complex and flexible data access policy in attribute-based encryption

S Hu, X Wang, H He, T Zhong - The Journal of Supercomputing, 2022 - Springer
… In this paper, we propose a ciphertext-policy attribute-based encryption scheme which
adopts the aggregative model based on and-gate multi-value access structure with condition …

Attribute-based encryption for cloud computing access control: A survey

Y Zhang, RH Deng, S Xu, J Sun, Q Li… - ACM Computing Surveys …, 2020 - dl.acm.org
… Fortunately, the attribute-based encryption (ABE) … flexible attributes are embedded into the
ciphertext and the DO does not need to know the identities of specific DUs before encryption. …