A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Fully Secure Broadcast Encryption for Inner-Product Predicates
2012
Procedia Engineering
According to the broadcast encryption scheme with wide applications in the real world without considering its security and efficiency in the model simultaneously, a fully secure broadcast encryption for ...
Furthermore, the scheme is proved by using a non-interactive static assumption and the analysis results indicated that the scheme is fully secure. ...
encryption, a fully secure broadcast encryption for inner-product predicates was brought forward. ...
doi:10.1016/j.proeng.2011.12.714
fatcat:suuinqf4m5esrkweogaud6airq
Full Secure Attribute-Based Broadcast Encryption Achieved through Selective Techniques
2016
DEStech Transactions on Environment Energy and Earth Science
According to the broadcast encryption scheme couldn't consider its security and efficiency in one model simultaneously, a full secure attribute-based broadcast encryption achieved through selective techniques ...
By utilizing the prior techniques to prove selective security for functional encryption systems as a direct ingredient in devising proofs of full security, it is proved by combining the dual system encryption ...
, CP-ABE and the broadcast encryption, we propose a full secure attribute-based broadcast encryption scheme achieved through selective techniques. (3) In order to obtain a new proof of full security that ...
doi:10.12783/dteees/seeie2016/4528
fatcat:pnocps3oqbcftdt5c6kkzs3qj4
An Approach to Secure Data Sharing for Dynamic Groups in the Cloud
2014
IOSR Journal of Computer Engineering
In this paper, we propose a secure data sharing scheme for dynamic subgroups in the cloud. ...
By using group signature and dynamic broadcast encryption techniques, only privileged cloud user can store and share data. ...
[7] proposed secure provenance scheme based on the ciphertext-policy attribute-based encryption technique [8] , which allows any member in a group to share data with others. ...
doi:10.9790/0661-1633140145
fatcat:dtxth5zxcza5xkxpteycynr33e
Security and Privacy Challenges in Cloud Computing Environments
2010
IEEE Security and Privacy
group signature and dynamic broadcast encryption techniques. ...
To overcome this problem, a sharing secure data scheme among multiple users among a dynamic group is proposed so that any user within a group can share the data in a secure manner by leveraging both the ...
RELATED WORK Junod and Karlov [1] , propose a "CP-ABE based broadcast encryption" scheme that supports direct user revocation. ...
doi:10.1109/msp.2010.186
fatcat:oyqbvlgbzfb55fankcm7xhcsqq
Poster
2011
Proceedings of the 18th ACM conference on Computer and communications security - CCS '11
The procedure is based on Cipher-text Policy Attribute-Based Encryption (CP-ABE). ...
We propose a new and efficient scheme for broadcast encryption. ...
A powerful technique for public-key, broadcast encryption systems, is Attribute Based Encryption (ABE) (e.g., [5] , [12] ). ...
doi:10.1145/2046707.2093486
fatcat:uq47as4hxncsdnwu7broos5oba
An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
2013
Mathematical Problems in Engineering
Attribute-based encryption (ABE) is a new cryptographic primitive which provides a promising tool for addressing the problem of secure and fine-grained data sharing and decentralized access control. ...
Key-policy attribute-based encryption (KP-ABE) is an important type of ABE, which enables senders to encrypt messages under a set of attributes and private keys are associated with access structures that ...
Acknowledgments This research is jointly funded by the National Natural Science Foundation of China (Grant no. 61173189) and the Guangdong Province Information Security Key Laboratory Project. ...
doi:10.1155/2013/810969
fatcat:jp2467xlrfh3lkxxte2ktjxxfi
Recipient Anonymous Ciphertext-Policy Attribute-based Broadcast Encryption
2018
International Journal of Network Security
The ciphertext-policy (CP) attribute-based broadcast encryption (CP-ABBE) is a more flexible broadcast encryption (BE), in which the broadcaster encrypts the data with an access policy and a receiver set ...
The proposed scheme achieves full security based on the dual system encryption and constant size ciphertexts. ...
In recent years, there have been many broadcast encryption schemes such as identity-based BE [15] , attribute-based BE [18] , and anonymous identity-based BE [23] . ...
dblp:journals/ijnsec/ZhangY18
fatcat:cn4h4fyybjbxrmifl5gj4bekgy
Efficient Methods for Integrating Traceability and Broadcast Encryption
[chapter]
1999
Lecture Notes in Computer Science
In particular, we present a method for adding any desired level of broadcasting capability to any traceability scheme and a method for adding any desired level of traceability to any broadcast encryption ...
Broadcast encryption schemes enable the center to prevent certain users from recovering the information that is broadcast in encrypted form, while traceability schemes enable the center to trace users ...
Clearly, security is an important attribute of broadcast encryption schemes. Two commonly used measures of security are resiliency [9] and traceability [7, 17, 12] . ...
doi:10.1007/3-540-48405-1_24
fatcat:l6wasrqjhvaqjo4tat7zkb66jq
SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing
2018
Sensors
The attribute-based encryption (ABE) is a cryptographic technique which provides fine-grained access control for encrypted data [7] . ...
To ensure the origin of a message, message authentication schemes based on identity based signature (IBS) and attribute-based signature (ABS) in VCC have been studied. ...
References
Conclusions This paper proposes a secure and efficient message access control and authentication scheme for VCC based on HABE and ABS. ...
doi:10.3390/s18020666
pmid:29495269
pmcid:PMC5856098
fatcat:4rvd2ffparbwha6ucshxvdnjxa
A conditional access system with efficient key distribution and revocation for mobile pay-TV systems
2013
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
In this article, we introduce a scalable access control scheme to integrate the merits of broadcasting regardless of group size and sound security assurance, including fine-grained access control and collusion ...
Through the performance evaluation and functionality comparison, the proposed scheme should be a decent candidate to enhance the security strength and transmission efficiency in a mobile pay-TV system. ...
Based on a novel attribute-based encryption, the broadcast virtue is no longer confined to the group size limitation. ...
doi:10.1145/2487268.2487271
fatcat:esj6itux4zditpf4u3grdgbqci
Encryption Techniques to Ensure Data Confidentiality in Cloud
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Attribute-Based Encryption, Identity-Based Broadcast Encryption, Searchable Encryption, Homomorphic Encryption, Fully Homomorphic Encryption and so on. ...
In order to share valuable data confidentially on the cloud in a secured way, various encryption techniques are available starting from Identity-Based Encryption, Attribute-Based Encryption, Hierarchical ...
Identity-Based Broadcast Encryption (IDBBE) In this method, the data owner can encrypt the data once and then can broadcast the data in encrypted form to a selected group of users. ...
doi:10.35940/ijitee.k1215.09811s19
fatcat:ns5irdtdlvh5bbfzaxeg4mbvny
Generalized Identity Based and Broadcast Encryption Schemes
[chapter]
2008
Lecture Notes in Computer Science
One application of these results gives the first broadcast HIBE system with short ciphertexts. Broadcast HIBE solves a natural problem having to do with identity-based encrypted email. ...
We provide a general framework for constructing identitybased and broadcast encryption systems. ...
Acknowledgement Special thanks to Adam Barth for helpful discussions on multi-authority email encryption. ...
doi:10.1007/978-3-540-89255-7_28
fatcat:i4jt74uzorc7xcj5svvqgcextu
On efficient ciphertext-policy attribute based encryption and broadcast encryption
2010
Proceedings of the 17th ACM conference on Computer and communications security - CCS '10
Each ciphertext in CCP-ABE requires only 2 elements on a bilinear group. Based on CCP-ABE, we further proposed an Attribute Based Broadcast Encryption (ABBE) scheme. ...
Compared to existing Broadcast Encryption (BE) schemes, ABBE is more flexible because a broadcasted message can be encrypted by an expressive access policy, either with or without explicit specifying the ...
-ABBE : Based on CCP-ABE, we present an Attribute Based Broadcast Encryption (ABBE) scheme. ...
doi:10.1145/1866307.1866420
dblp:conf/ccs/ZhouH10
fatcat:wrjs6jlrjjcipfv323cc26xmdi
Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys
[chapter]
2016
Lecture Notes in Computer Science
Essentially, our scheme is a combination of the Boneh-Gentry-Waters broadcast encryption and of the Lewko-Sahai-Waters revocation schemes; the former is used to express attribute-based access policies ...
We describe in this paper an efficient ciphertext-policy attribute-based broadcast encryption scheme (CP-ABBE) supporting negative attributes and able to handle access policies in conjunctive normal form ...
Attribute-Based Broadcast Encryption Transforming an ABE encryption scheme for using it in a broadcast scenario is a natural question, as in practice, broadcasters are most of the time addressing sets ...
doi:10.1007/978-3-319-30840-1_4
fatcat:esyknb74erbypcqh4hhamrs45u
A Scalable and Secure Group Key Management Method for Secure V2V Communication
2020
Sensors
To address the providing confidentiality of vehicle-to-vehicle (V2V) broadcasting, we propose a group key management and message encryption method that is secure, lightweight, and scalable. ...
In addition, the proposed method employs a lightweight matrix-based encryption algorithm that can be easily applicable with the proposed group key management method. ...
A lightweight attribute-based encryption protocol is proposed to guarantee access control to the purchased services, derived from the elliptic curve integrated encryption scheme (ECIES). ...
doi:10.3390/s20216137
pmid:33126693
fatcat:movv5iwt2jetnodveirrnftxlu
« Previous
Showing results 1 — 15 out of 6,663 results