Results 11 - 20
of
571
NEON implementation of an attribute-based encryption scheme
"... Abstract. In 2011, Waters presented a ciphertext-policy attribute-based encryption protocol that uses bilinear pairings to provide control access mechanisms, where the set of user’s attributes is specified by means of a linear secret sharing scheme. Some of the applications foreseen for this protoco ..."
Abstract
-
Cited by 6 (1 self)
- Add to MetaCart
Abstract. In 2011, Waters presented a ciphertext-policy attribute-based encryption protocol that uses bilinear pairings to provide control access mechanisms, where the set of user’s attributes is specified by means of a linear secret sharing scheme. Some of the applications foreseen
AttributeBased Encryption Schemes with Constant-Size Ciphertexts
- in "Theoretical Computer Science
"... Abstract. Attribute-based encryption (ABE), as introduced by Sahai and Waters, allows for finegrained access control on encrypted data. In its key-policy flavor (the dual ciphertext-policy scenario proceeds the other way around), the primitive enables senders to encrypt messages under a set of attri ..."
Abstract
-
Cited by 6 (1 self)
- Add to MetaCart
Abstract. Attribute-based encryption (ABE), as introduced by Sahai and Waters, allows for finegrained access control on encrypted data. In its key-policy flavor (the dual ciphertext-policy scenario proceeds the other way around), the primitive enables senders to encrypt messages under a set
Secure Outsourced Attribute-based Encryption
, 2012
"... Attribute-Based Encryption (ABE) is a promising cryptographic primitive which significantly enhances the versatility of access control mechanisms. Due to the high expressiveness of ABE policies, the computational complexities of ABE key-issuing (by Attribute Authorities (AAs)) and decryption (by el ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
Attribute-Based Encryption (ABE) is a promising cryptographic primitive which significantly enhances the versatility of access control mechanisms. Due to the high expressiveness of ABE policies, the computational complexities of ABE key-issuing (by Attribute Authorities (AAs)) and decryption (by
Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption
- IEEE Transactions on Parallel and Distributed Systems
, 2012
"... Abstract—Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third p ..."
Abstract
-
Cited by 59 (2 self)
- Add to MetaCart
and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability, and efficiency of our proposed scheme. Index Terms—Personal health records, cloud computing, data privacy, fine-grained access control, attribute-based
A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage
"... Abstract Cloud storage service is one of cloud services where cloud service provider can provide storage space to customers. Because cloud storage service has many advantages which include convenience, high computation and capacity, it attracts the user to outsource data in the cloud. However, the ..."
Abstract
- Add to MetaCart
, the user outsources data directly in cloud storage service that is unsafe when outsourcing data is sensitive for the user. Therefore, ciphertext-policy attribute-based encryption is a promising cryptographic solution in cloud environment, which can be drawn up for access control by the data owner to define
Enhancing Attribute-Based Encryption with Attribute Hierarchy
, 2009
"... Attribute-based encryption (ABE) has been envisioned as a promising cryptographic primitive for realizing secure and flexible access control. However, ABE is being criticized for its high scheme overhead as extensive pairing operations are usually required. In this paper, we focus on improving the e ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
Attribute-based encryption (ABE) has been envisioned as a promising cryptographic primitive for realizing secure and flexible access control. However, ABE is being criticized for its high scheme overhead as extensive pairing operations are usually required. In this paper, we focus on improving
Secure Attribute-Based Access Control with a Ciphertext-Policy Attribute-Based Encryption Scheme
"... Abstract An access control system is needed to ensure only authorized users can access a sensitive resource. We propose a secure access control based on a fully secure and fine grained ciphertext-policy attribute-based encryption scheme. The access control for a sensitive resource is ensured by encr ..."
Abstract
- Add to MetaCart
Abstract An access control system is needed to ensure only authorized users can access a sensitive resource. We propose a secure access control based on a fully secure and fine grained ciphertext-policy attribute-based encryption scheme. The access control for a sensitive resource is ensured
Privacy-aware Attribute-based Encryption with User Accountability
, 2009
"... As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern of user access privacy, privacy-aware ABE schemes are being developed to achieve hidden access policy recently. For the pu ..."
Abstract
-
Cited by 14 (3 self)
- Add to MetaCart
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern of user access privacy, privacy-aware ABE schemes are being developed to achieve hidden access policy recently
Dynamic credentials and ciphertext delegation for attribute-based encryption
- in Proceedings of the 32nd Annual International Cryptology Conference: Advances in Cryptology - CRYPTO’2012
, 2012
"... Motivated by the question of access control in cloud storage, we consider the problem using Attribute-Based Encryption (ABE) in a setting where users ’ credentials may change and ciphertexts may be stored by a third party. We find that a comprehensive solution to our problem must simultaneously allo ..."
Abstract
-
Cited by 14 (0 self)
- Add to MetaCart
Motivated by the question of access control in cloud storage, we consider the problem using Attribute-Based Encryption (ABE) in a setting where users ’ credentials may change and ciphertexts may be stored by a third party. We find that a comprehensive solution to our problem must simultaneously
VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data
"... Abstract—It is quite common nowadays for data owners to outsource their data to the cloud. Since the cloud is not fully trusted, the outsourced data should be encrypted, which however brings a range of problems, such as: How can the authorized data users search over a data owner’s outsourced encrypt ..."
Abstract
-
Cited by 6 (2 self)
- Add to MetaCart
attribute-based keyword search (VABKS). This solution allows a data user, whose credentials satisfy a data owner’s access control policy, to (i) search over the data owner’s outsourced encrypted data, (ii) outsource the tedious search operations to the cloud, and (iii) verify whether the cloud has
Results 11 - 20
of
571