• No results found

Attribute based encryption

Contributions to Attribute-Based Encryption and Its Variants

Contributions to Attribute-Based Encryption and Its Variants

... is encryption, but PKI-based authentication is not efficient in Fog ...primitive Attribute-based Encryption is adopted[YLL + 15, YZL + 16], which allows flexible one-to-many ...

148

Dynamic  Credentials   and  Ciphertext  Delegation  for  Attribute-Based  Encryption

Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption

... A first step in addressing this problem of trust is to only store information in encrypted form. However, data access is not static – as employees are hired, fired or promoted, it will be necessary to change who can ...

40

ATTRIBUTE BASED ENCRYPTION IN PERSONAL HEALTH RECORD

ATTRIBUTE BASED ENCRYPTION IN PERSONAL HEALTH RECORD

... The main goal of this framework is to that provide security for accessing the data and management of data same time. The idea is divided the system into two parts i.e. public domain and private domain. Public domain ...

6

Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption

Privilege and Anonymity with Fully Anonymous Attribute-Based Encryption

... Numerous encryption procedures have been utilized to put away information on cloud to peruse the information while performing calculations on the ...utilizing Attribute based encryption ...

5

Software  implementation  of  an  Attribute-Based  Encryption  scheme

Software implementation of an Attribute-Based Encryption scheme

... The remainder of this paper is organized as follows. In Section II relevant mathematical concepts and definitions used throughout this paper are given. Sections III and IV present several implementation notes about the ...

35

Attribute-Based  Encryption  for  Circuits  from  Multilinear  Maps

Attribute-Based Encryption for Circuits from Multilinear Maps

... constructing Attribute-Based Encryption sys- tems for circuits of arbitrary ...homomorphic encryption system, or the Boneh-Sahai- Waters [BSW06] Traitor Tracing scheme, there appears to exist ...

24

Attribute-Based  Encryption  Optimized  for  Cloud  Computing

Attribute-Based Encryption Optimized for Cloud Computing

... make attribute-based encryption (ABE) more suitable for access control to data stored in the ...the encryption and decryption algorithms run by the ...

13

An Attribute Based Encryption Scheme to Secure Fog Communications

An Attribute Based Encryption Scheme to Secure Fog Communications

... requirements. Attribute-Based Encryption (ABE) developed by it is a promising solution that can provide some of the security ...key based on one- to-many encryption that employs the ...

7

Remarks  on  the  Cryptographic  Primitive  of  Attribute-based  Encryption

Remarks on the Cryptographic Primitive of Attribute-based Encryption

... Attribute-based encryption (ABE) which allows users to encrypt and decrypt messages based on user attributes is a type of one-to-many ...Keywords. Attribute-based ...

9

Key  distribution  system   and  attribute-based  encryption

Key distribution system and attribute-based encryption

... [12] Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, pp. 321–334. IEEE Press, Los Alamitos(2007) [13] Boneh, D., ...

9

Secure Key Generation in Attribute Based Encryption

Secure Key Generation in Attribute Based Encryption

... Attribute Based Encryption is one the cryptographic policy which is mainly suitable for access control in cloud storage ...Policy Attribute Based Encryption) and KP-ABE (Key ...

8

Survey Paper on Attribute Based Encryption & Decryption

Survey Paper on Attribute Based Encryption & Decryption

... well-performed encryption standard is required in which security operations do not bother other ...homorphic encryption some mathematical operations are applied to encrypted cipher blocks and can be ...

7

An Attribute Based Encryption Scheme To Secure Fog Communication

An Attribute Based Encryption Scheme To Secure Fog Communication

... for encryption and ...Policy Attribute Based Encryption (CP-ABE) to empower validated and condential interchanges between fog nodes and the ...

5

Integrity Verification and Attribute based Encryption for Cloud Storage

Integrity Verification and Attribute based Encryption for Cloud Storage

... cloud. Attribute-based encryption (ABE) technology has been used to design a fine-grained access control system, which provides one good method to solve the security issues in the cloud ...called ...

8

Secure Cloud Data Using Attribute Based Encryption

Secure Cloud Data Using Attribute Based Encryption

... different Attribute based encryption methods are ...new encryption method based on Attribute Based Encryption (ABE) using hash function, digital signature and ...

5

Realizing  Chosen  Ciphertext  Security  Generically  in  Attribute-Based  Encryption   and  Predicate  Encryption

Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption

... on Attribute-Based Encryption and One-sided Predicate Encryption, we believe our transformation could apply to other specialized forms of ...broadcast encryption [FN94] ...predicate ...

37

Ciphertext Policy Attribute Based Encryption

Ciphertext Policy Attribute Based Encryption

... Due to emerging technologies day today life has become faster. Now a day people want to store their data on cloud. Cloud is an Internet storage area where users can use storage efficiently and the services of cloud ...

5

Attribute based Encryption on Secret Verification in Cloud

Attribute based Encryption on Secret Verification in Cloud

... for encryption and decryption by executing paillier key generation algorithm and also signing key for signing the message using secure hash function ...as Attribute based ...as Attribute ...

6

Secure Jelastic Cloud by Attribute Based Encryption

Secure Jelastic Cloud by Attribute Based Encryption

... advanced encryption standard [AES] for sharing the personal health records securely in untrusted servers, like third party ...Advanced encryption standard algorithm is useful for handling the multiple ...

6

Attribute Based Encryption Techniques and its Applications.

Attribute Based Encryption Techniques and its Applications.

... The access formula of access structure in user’s private key can represent any type through attributes such as negative ones. It is different from the previous attribute- based encryption scheme. The ...

6

Show all 10000 documents...

Related subjects