• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 571
Next 10 →

NEON implementation of an attribute-based encryption scheme

by Ana Helena Sánchez, Francisco Rodríguez-henríquez
"... Abstract. In 2011, Waters presented a ciphertext-policy attribute-based encryption protocol that uses bilinear pairings to provide control access mechanisms, where the set of user’s attributes is specified by means of a linear secret sharing scheme. Some of the applications foreseen for this protoco ..."
Abstract - Cited by 6 (1 self) - Add to MetaCart
Abstract. In 2011, Waters presented a ciphertext-policy attribute-based encryption protocol that uses bilinear pairings to provide control access mechanisms, where the set of user’s attributes is specified by means of a linear secret sharing scheme. Some of the applications foreseen

AttributeBased Encryption Schemes with Constant-Size Ciphertexts

by Nuttapong Attrapadung, Javier Herranz, Fabien Laguillaume, Benoît Libert, Elie De Panafieu, Carla Ràfols - in "Theoretical Computer Science
"... Abstract. Attribute-based encryption (ABE), as introduced by Sahai and Waters, allows for finegrained access control on encrypted data. In its key-policy flavor (the dual ciphertext-policy scenario proceeds the other way around), the primitive enables senders to encrypt messages under a set of attri ..."
Abstract - Cited by 6 (1 self) - Add to MetaCart
Abstract. Attribute-based encryption (ABE), as introduced by Sahai and Waters, allows for finegrained access control on encrypted data. In its key-policy flavor (the dual ciphertext-policy scenario proceeds the other way around), the primitive enables senders to encrypt messages under a set

Secure Outsourced Attribute-based Encryption

by Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia, Duncan S. Wong , 2012
"... Attribute-Based Encryption (ABE) is a promising cryptographic primitive which significantly enhances the versatility of access control mechanisms. Due to the high expressiveness of ABE policies, the computational complexities of ABE key-issuing (by Attribute Authorities (AAs)) and decryption (by el ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
Attribute-Based Encryption (ABE) is a promising cryptographic primitive which significantly enhances the versatility of access control mechanisms. Due to the high expressiveness of ABE policies, the computational complexities of ABE key-issuing (by Attribute Authorities (AAs)) and decryption (by

Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption

by Ming Li, Shucheng Yu, Yao Zheng, Student Member, Kui Ren, Senior Member, Wenjing Lou, Senior Member - IEEE Transactions on Parallel and Distributed Systems , 2012
"... Abstract—Personal health record (PHR) is an emerging patient-centric model of health information exchange, which is often outsourced to be stored at a third party, such as cloud providers. However, there have been wide privacy concerns as personal health information could be exposed to those third p ..."
Abstract - Cited by 59 (2 self) - Add to MetaCart
and break-glass access under emergency scenarios. Extensive analytical and experimental results are presented which show the security, scalability, and efficiency of our proposed scheme. Index Terms—Personal health records, cloud computing, data privacy, fine-grained access control, attribute-based

A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage

by Chi-Wei Liu , Wei-Fu Hsien , Chou-Chen Yang , Min-Shiang Hwang , Min-Shiang Hwang
"... Abstract Cloud storage service is one of cloud services where cloud service provider can provide storage space to customers. Because cloud storage service has many advantages which include convenience, high computation and capacity, it attracts the user to outsource data in the cloud. However, the ..."
Abstract - Add to MetaCart
, the user outsources data directly in cloud storage service that is unsafe when outsourcing data is sensitive for the user. Therefore, ciphertext-policy attribute-based encryption is a promising cryptographic solution in cloud environment, which can be drawn up for access control by the data owner to define

Enhancing Attribute-Based Encryption with Attribute Hierarchy

by Jin Li, Qian Wang, Cong Wang, Kui Ren , 2009
"... Attribute-based encryption (ABE) has been envisioned as a promising cryptographic primitive for realizing secure and flexible access control. However, ABE is being criticized for its high scheme overhead as extensive pairing operations are usually required. In this paper, we focus on improving the e ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Attribute-based encryption (ABE) has been envisioned as a promising cryptographic primitive for realizing secure and flexible access control. However, ABE is being criticized for its high scheme overhead as extensive pairing operations are usually required. In this paper, we focus on improving

Secure Attribute-Based Access Control with a Ciphertext-Policy Attribute-Based Encryption Scheme

by Rifki Sadikin, Kil Houm Park
"... Abstract An access control system is needed to ensure only authorized users can access a sensitive resource. We propose a secure access control based on a fully secure and fine grained ciphertext-policy attribute-based encryption scheme. The access control for a sensitive resource is ensured by encr ..."
Abstract - Add to MetaCart
Abstract An access control system is needed to ensure only authorized users can access a sensitive resource. We propose a secure access control based on a fully secure and fine grained ciphertext-policy attribute-based encryption scheme. The access control for a sensitive resource is ensured

Privacy-aware Attribute-based Encryption with User Accountability

by Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan , 2009
"... As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern of user access privacy, privacy-aware ABE schemes are being developed to achieve hidden access policy recently. For the pu ..."
Abstract - Cited by 14 (3 self) - Add to MetaCart
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern of user access privacy, privacy-aware ABE schemes are being developed to achieve hidden access policy recently

Dynamic credentials and ciphertext delegation for attribute-based encryption

by Amit Sahai, Hakan Seyalioglu - in Proceedings of the 32nd Annual International Cryptology Conference: Advances in Cryptology - CRYPTO’2012 , 2012
"... Motivated by the question of access control in cloud storage, we consider the problem using Attribute-Based Encryption (ABE) in a setting where users ’ credentials may change and ciphertexts may be stored by a third party. We find that a comprehensive solution to our problem must simultaneously allo ..."
Abstract - Cited by 14 (0 self) - Add to MetaCart
Motivated by the question of access control in cloud storage, we consider the problem using Attribute-Based Encryption (ABE) in a setting where users ’ credentials may change and ciphertexts may be stored by a third party. We find that a comprehensive solution to our problem must simultaneously

VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data

by Qingji Zheng, Shouhuai Xu
"... Abstract—It is quite common nowadays for data owners to outsource their data to the cloud. Since the cloud is not fully trusted, the outsourced data should be encrypted, which however brings a range of problems, such as: How can the authorized data users search over a data owner’s outsourced encrypt ..."
Abstract - Cited by 6 (2 self) - Add to MetaCart
attribute-based keyword search (VABKS). This solution allows a data user, whose credentials satisfy a data owner’s access control policy, to (i) search over the data owner’s outsourced encrypted data, (ii) outsource the tedious search operations to the cloud, and (iii) verify whether the cloud has
Next 10 →
Results 11 - 20 of 571
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University