Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,125 Hits in 5.8 sec

Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing

2016 KSII Transactions on Internet and Information Systems  
In ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user's secret key is associated with a set of attributes, and the ciphertext is associated with an access policy.  ...  the users do useless computation if the attributes don't match the hidden access policy.  ...  [32] proposed a white-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes.  ... 
doi:10.3837/tiis.2016.07.026 fatcat:ztcmphqyjfhwpmrdw2l53o4kym

Ciphertext policy Attribute based Encryption with anonymous access policy

A Balu, K Kuppusamy
2010 International Journal of Peer to Peer Networks  
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt the encrypted message. The policy can be formed with the help of attributes.  ...  The proposed construction is provably secure under Decision Bilinear Diffe-Hellman assumption. Setup: The setup algorithm takes no input other than the implicit security parameter.  ...  Our Contribution We present a scheme for constructing a Ciphertext Policy Attribute based Encryption with hidden access policy and provide security under the Decisional Diffie-Hellman assumption.  ... 
doi:10.5121/ijp2p.2010.1101 fatcat:av32bkbe6zdzncm27foeoh2e24

Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing

2019 KSII Transactions on Internet and Information Systems  
Ciphertext-policy attribute-based encryption (CP-ABE) is one of the practical technologies to share data over cloud since it can protect data confidentiality and support fine-grained access control on  ...  Unfortunately, in this paper, we show that their scheme fails to achieve hidden access policy at first.  ...  Generally speaking, the ABE schemes can be divided into two types: key-policy attribute-based encryption and ciphertext-policy attribute-based encryption, abbreviated as CP-ABE and KP-ABE respectively.  ... 
doi:10.3837/tiis.2019.05.029 fatcat:lbnwubxvfzaupnulqqxysnf7uq

Ciphertext Policy Attribute based Encryption with anonymous access policy [article]

A. Balu, K. Kuppusamy
2010 arXiv   pre-print
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt the encrypted message. The policy can be formed with the help of attributes.  ...  The proposed construction is provably secure under Decision Bilinear Diffe-Hellman assumption.  ...  Our Contribution We present a scheme for constructing a Ciphertext Policy Attribute based Encryption with hidden access policy and provide security under the Decisional Diffie-Hellman assumption.  ... 
arXiv:1011.0527v1 fatcat:onqdw2vngnfs5inlciy3nc2gxe

Offline/Online Outsourced Attribute-Based Encryption with Partial Policy Hidden for the Internet of Things

Xixi Yan, Guanghui He, Jinxia Yu, Yongli Tang, Mingjie Zhao
2020 Journal of Sensors  
To mitigate these issues, an offline/online attribute-based encryption scheme that supports partial policy hidden and outsourcing decryption will be proposed.  ...  Meanwhile, in order to solve the problem of policy disclosure under the cloud platform, the policy hidden is supported, that is, the attribute is divided into the attribute value and the attribute name  ...  [24] proposed an offline/online attribute-based encryption scheme that achieved full security under the standard model.  ... 
doi:10.1155/2020/8861114 fatcat:eqjwnfxrorhgtix5a7ywdw2vne

Towards a cryptography encyclopedia: a survey on attribute-based encryption

Thomas Prantl, Timo Zeck, Lukas Horn, Lukas ffländer, André Bauer, lexandra Dmitrienko, Christian Krupitzer, Samuel Kounev
2023 Journal of Surveillance, Security and Safety  
In this survey, we create a sub-encyclopedia for attribute-based encryption (ABE) schemes.  ...  The diverse use of encryption schemes has led to the development of schemes with a variety of properties.  ...  It had ciphertexts of constant size and used a threshold-based access policy. The security analysis in standard models showed resistance to selective adversaries under q-type assumptions. Li et al.  ... 
doi:10.20517/jsss.2023.30 fatcat:sreleuvsivbznkt72sypgthym4

A Review on Access Control Policy and Key Generation in Data Sharing

Mr. Mangnale Gajanan K., Prof. Korde A. L., Dr R K Patil, Dr R K Sawant
2019 International Journal of Advanced Engineering Research and Science  
Hence, both ciphertext storage and time cost of encryption are saved. Additionally, the proposed scheme is proved to be secure under the standard assumption.  ...  It consist four different attribute based encryption schemes such as KP-ABE (Key-policy attribute-based encryption), CP-ABE (ciphertext-policy attribute-based encryption), HABE (Hierarchical Attribute  ... 
doi:10.22161/ijaers.6.2.6 fatcat:jghs5et6lbhxxjgd7e2c2d2cve

An encrypted cloud email searching and filtering scheme based on hidden policy ciphertext-policy attribute-based encryption with keyword search

Jian Gao, Fucai Zhou
2021 IEEE Access  
INDEX TERMS attribute-based keyword search; Dual System Encryption; encrypted email filtering; hidden policy.  ...  We propose an encrypted cloud email searching and filtering scheme based on hidden policy ciphertextpolicy attribute-based encryption with keyword search as a new solution.  ...  According to this direction of thinking, we become the first to propose a hidden policy ciphertext-policy attribute-based encryption with keyword search (HPCPABKS) scheme to solve the problem of encrypted  ... 
doi:10.1109/access.2021.3136331 fatcat:lpqmzhm5ovh2zfgqtyqmmwokuq

Anonymous attribute-based encryption supporting efficient decryption test

Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li
2013 Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13  
This technique works by computing special components in ciphertexts, which are used to perform the test that if the attribute private key matches the hidden attributes policy in ciphertexts without decryption  ...  Attribute-based encryption (ABE) has been widely studied recently to support fine-grained access control of shared data.  ...  Especially, ciphertext-policy attribute-based encryption (CP-ABE) [1] puts access policy decisions in the hands of data owners.  ... 
doi:10.1145/2484313.2484381 dblp:conf/ccs/ZhangCLWL13 fatcat:4alxqaddcjeahodjhhzg2ar4zm

Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks

Changhee Hahn, Hyunsoo Kwon, Junbeom Hur
2016 Mobile Information Systems  
The proposed scheme guarantees a hidden policy, constant-sized ciphertexts, and traces, with security analyses.  ...  In this paper, we propose an efficient attribute-based secure data sharing scheme in mHealth.  ...  An encryptor defines the access policy with a set of attributes, encrypts the EHRs associated with clinical reports under the policy, and uploads the ciphertext and the obfuscated policy to the storage  ... 
doi:10.1155/2016/6545873 fatcat:x64vnqiwo5fq5m7xbkxwjhpimu

Hierarchical policy delegation in multiple-authority ABE

Peng Wang, Chinya V. Ravishankar
2015 International Journal of Information and Computer Security  
Current methods require encryptors to build ciphertext access policies themselves, using attributes published by authority domains.  ...  We present HM-ABE, a hierarchical multi-authority attributebased encryption scheme with policy delegation, that generalizes current work significantly.  ...  Conclusion We have presented HM-ABE, a new hierarchical distributed attribute-based encryption scheme, which permits policy delegation. Recursive policy delegation is supported.  ... 
doi:10.1504/ijics.2015.073020 fatcat:3intctu4jzhyhbctigrzxnq4ki

Efficient privacy-preserving access control of mobile multimedia data in cloud computing

Qi Li, Youliang Tian, Yinghui Zhang, Limin Shen, Jingjing Guo
2019 IEEE Access  
With the nature of allowing the encryptor to define the access policy before encrypting a message, Ciphertext-policy attribute-based encryption (CP-ABE) has been widely adopted as a primitive to design  ...  INDEX TERMS Mobile multimedia data, access control, CP-ABE, partially hidden policy, online/offline encryption, efficient decryption.  ...  In the CP-ABE ciphertext, the concrete attribute values of the specific access policy are embedded and hidden.  ... 
doi:10.1109/access.2019.2939299 fatcat:7lvsr2gg3rha7grkoy2s6ma2oi

Expressive CP-ABE with partially hidden access structures

Junzuo Lai, Robert H. Deng, Yingjiu Li
2012 Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security - ASIACCS '12  
In a traditional ciphertext-policy attribute-based encryption (CP-ABE) scheme, an access structure, also refereed to as ciphertext-policy, is sent along with a ciphertext explicitly, and anyone who obtains  ...  One can construct CP-ABE with hidden access structures from attribute-hiding Inner-product Predicate Encryption (IPE) [12] .  ...  Attribute-Based Encryption (ABE).  ... 
doi:10.1145/2414456.2414465 dblp:conf/ccs/LaiDL12 fatcat:6gokhotpcjabpcr3fz4fd22pja

A Survey of Research Progress and Development Tendency of Attribute-Based Encryption

Liaojun Pang, Jie Yang, Zhengtao Jiang
2014 The Scientific World Journal  
With the development of cryptography, the attribute-based encryption (ABE) draws widespread attention of the researchers in recent years.  ...  The ABE scheme, which belongs to the public key encryption mechanism, takes attributes as public key and associates them with the ciphertext or the user's secret key.  ...  Acknowledgment This work is supported by the National Natural Science Foundation of China under Grant nos. 61103178, 61103199, and 60803151, and the Basic Science Research Fund in Xidian University.  ... 
doi:10.1155/2014/193426 pmid:25101313 pmcid:PMC4101931 fatcat:gj2byf7xozaadhx4ppfcblgany

M.Tech Thesis.pdf

Sucharita Khuntia
2021 figshare.com  
In this paper, we propose a New Hidden Policy Ciphertext Policy Attribute Based Encryption (HP-CP-ABE) to ensure Big Data Access Control with Privacy-preserving Policy in Cloud.  ...  We also applied mask technique on each attribute in access policy and embed the access policy in ciphertext, to protect user's private information from access policy.  ...  This paper proposed two models, 1st proposed a CP-ABE hidden policy model that is used tree-based access structure and also has a CPA attack under DBDH assumption.  ... 
doi:10.6084/m9.figshare.14541912.v1 fatcat:hmwhmid6l5a57gyjloeityltdu
« Previous Showing results 1 — 15 out of 1,125 results