Key escrow-free attribute based encryption with user revocation

R Zhang, J Li, Y Lu, J Han, Y Zhang - Information Sciences, 2022 - Elsevier
… In the scheme [36], the trusted central authority is removed and … [37] provided a multi-authority
attribute-based encryption … protocol that is used to remove key escrow from IBE scheme [38]…

Attribute-based encryption for ciphertext in advanced encryption standard

M Raja, S Dhanasekaran, V Vasudevan - Materials Today: Proceedings, 2021 - Elsevier
… We display that key escrow hassle and also key … be removed from a conclusive cipher text?
It shows a CL requires facilitated endeavor with the KA and CS for unscramble cipher textual …

Constant ciphertext size multi-authority attribute-based scheme without key escrow

S Hu, J Li, Y Lu, Y Zhang - Journal of Internet Technology, 2020 - jit.ndhu.edu.tw
… cloud computing application, attribute based encryption (ABE) … How to eliminate the key
escrow is also an important and … the trusted central authority is removed and an anonymous key …

A survey on secured data sharing using ciphertext policy attribute based encryption in cloud

GA Thushara, SMS Bhanu - 2021 8th International Conference …, 2021 - ieeexplore.ieee.org
… Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic
cloud … Removing escrow from ciphertext policy attribute- based encryption. Computers and …

Trak-cpabe: a novel traceable, revocable and accountable ciphertext-policy attribute-based encryption scheme in cloud computing

M Bouchaala, C Ghazel, LA Saidane - Journal of Information Security and …, 2021 - Elsevier
… Traceability, revocation and key escrow issues will be detailed in this section. … Then,
we define the Ciphertext Policy Attribute Based Encryption (CPABE) scheme and its security …

Multiauthority attribute-based encryption for assuring data deletion

J Li, R Zhang, Y Lu, J Han, Y Zhang… - IEEE Systems …, 2022 - ieeexplore.ieee.org
… In fact, we hope the system still works normally after the delete operation is … Ciphertext-policy
attribute based encryption supporting any monotone access structures without escrow

TRO-CP-ABE: a secure and flexible layer with traceability and easy revocation in ciphertext-policy attribute-based encryption

A Nikose, K Srinivas - International Journal of Internet …, 2023 - inderscienceonline.com
… Our proposed traceable-revocable layer over ciphertext-policy attribute-based encryption (…
, revocability of users without collusion and also removes the key escrow problem, all at once. …

Revocable blockchain-aided attribute-based encryption with escrow-free in cloud storage

Y Guo, Z Lu, H Ge, J Li - IEEE Transactions on Computers, 2023 - ieeexplore.ieee.org
… introduce a revocable blockchain-aided attribute-based encryption with escrowfree (BC-ABE…
replaces the key authority to solve the key escrow problem, where the consensus nodes are …

Efficient CiphertextPolicy AttributeBased Encryption Constructions with Outsourced Encryption and Decryption

H El Gafif, A Toumanari - Security and Communication …, 2021 - Wiley Online Library
policy, were removed from the user’s side. For instance, in libfenc [15], about 3000 lines are
dedicated to access policy … by preventing the key-escrow problem produced when attackers …

An efficient and revocable attribute-based data sharing scheme with rich expression and escrow freedom

C Lan, L Liu, C Wang, H Li - Information Sciences, 2023 - Elsevier
… In addition, in order to improve the decryption efficiency of attribute-based encryption and
make the scheme better adapt to the resource-constrained environment, we extend the …