Flexible attribute-based encryption applicable to secure e-healthcare records
B Qin, H Deng, Q Wu, J Domingo-Ferrer… - International Journal of …, 2015 - Springer
In e-healthcare record systems (EHRS), attribute-based encryption (ABE) appears as a natural
way to achieve fine-grained access control on health records. Some proposals exploit key…
way to achieve fine-grained access control on health records. Some proposals exploit key…
White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes
Ciphertext-policy attribute-based encryption (CP-ABE) enables fine-grained access control
to the encrypted data for commercial applications. There has been significant progress in CP-…
to the encrypted data for commercial applications. There has been significant progress in CP-…
The lord of the shares: Combining attribute-based encryption and searchable encryption for flexible data sharing
A Michalas - Proceedings of the 34th ACM/SIGAPP symposium on …, 2019 - dl.acm.org
… Having identified both the advantages and the disadvantages of Symmetric Searchable
Encryption and Attribute-Based Encryption schemes we propose a protocol that allows users of …
Encryption and Attribute-Based Encryption schemes we propose a protocol that allows users of …
HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
… attribute-based encryption (ABE) … , flexible, and fine-grained access control of outsourced
data in cloud computing, in this paper, we propose hierarchical attribute-set-based encryption (…
data in cloud computing, in this paper, we propose hierarchical attribute-set-based encryption (…
Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits
M MahdaviOliaee, Z Ahmadian - Journal of Computer Virology and …, 2023 - Springer
… We also define the concept of hidden result attribute based encryption (HR-ABE) which
means that the result of the arithmetic function will not be revealed to the users. We define a new …
means that the result of the arithmetic function will not be revealed to the users. We define a new …
Flexible and fine-grained attribute-based data storage in cloud computing
J Li, W Yao, Y Zhang, H Qian… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
… fine-grained file access control, attribute based encryption (ABE) was proposed and used
in … In this article, we provide a ciphertextpolicy attribute based encryption (CP-ABE) scheme …
in … In this article, we provide a ciphertextpolicy attribute based encryption (CP-ABE) scheme …
Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems
F Zhao, T Nishide, K Sakurai - International Conference on Information …, 2011 - Springer
… [10] apply the attribute-based encryption (ABE) to manage the sharing of encrypted data.
Detailed comparison of our scheme with these previous works will be discussed in the last …
Detailed comparison of our scheme with these previous works will be discussed in the last …
PH-MG-ABE: A flexible policy-hidden multi-group attribute-based encryption scheme for secure cloud storage
J Li, E Zhang, J Han, Y Zhang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
… Abstract—Ciphertext-policy attribute-based encryption (CPABE) has attracted significant …
In this paper, we propose a flexible policy-hidden multi-group attribute-based encryption (PH-…
In this paper, we propose a flexible policy-hidden multi-group attribute-based encryption (PH-…
Complex and flexible data access policy in attribute-based encryption
S Hu, X Wang, H He, T Zhong - The Journal of Supercomputing, 2022 - Springer
… In this paper, we propose a ciphertext-policy attribute-based encryption scheme which
adopts the aggregative model based on and-gate multi-value access structure with condition …
adopts the aggregative model based on and-gate multi-value access structure with condition …
Attribute-based encryption for cloud computing access control: A survey
… Fortunately, the attribute-based encryption (ABE) … flexible attributes are embedded into the
ciphertext and the DO does not need to know the identities of specific DUs before encryption. …
ciphertext and the DO does not need to know the identities of specific DUs before encryption. …
Ähnliche Suchanfragen
- cloud computing attribute based encryption
- ciphertext policy attribute based encryption
- encryption scheme attribute level user revocation
- access provision attribute based encryption
- gap analysis attribute based encryption
- flexible attributes ciphertext policy
- flexible access control ciphertext policy attribute