Attribute‐based online/offline signcryption scheme

YS Rao - International Journal of Communication Systems, 2017 - Wiley Online Library
The efficiency of computation is one of the prime concerns in public key cryptography. The
notion of online/offline framework speeds up the process of encryption and signing. In this …

A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance

S Xu, G Yang, Y Mu, X Liu - Future Generation Computer Systems, 2019 - Elsevier
Abstract Internet of Things (IoT) cloud provides a practical and scalable solution to
accommodate the data management in large-scale IoT systems by migrating the data …

Ciphertext-policy attribute-based signcryption with verifiable outsourced designcryption for sharing personal health records

F Deng, Y Wang, L Peng, H Xiong, J Geng… - IEEE Access, 2018 - ieeexplore.ieee.org
Personal health record (PHR) is a patient-centric model of health information exchange,
which greatly facilitates the storage, access, and share of personal health information. In …

Secured Collaboration with Ciphertext Policy Attribute Based Signcryption in a Distributed Fog Environment for Medical Data Sharing

GA Thushara, SMS Bhanu - International Conference on Information …, 2023 - Springer
Smart hospitals are leveraging cloud computing as a practical platform for storing and
sharing medical data, enhancing medical analyses. However, entrusting sensitive medical …

Attribute-based encryption for attribute-based authentication, authorization, storage, and transmission in distributed storage systems

A Alston - arXiv preprint arXiv:1705.06002, 2017 - arxiv.org
Attribute-based encryption is a form of encryption which offers the capacity to encrypt data
such that it is only accessible to individuals holding a satisfactory configuration of attributes …

Ciphertext-Policy Attribute-Based Encryption for Access Control of Data in Cloud

VL Paruchuri, NL Anantha, VL Konagala… - International Journal of …, 2016 - earticle.net
In Distributed systems, the users with a certain set of attributes can only be able to access
the data. At present this process can be done through a trusted server where we will store …

[PDF][PDF] Key-cipher policy attribute-based encryption mechanism for access control of multimedia data in cloud storages

KM Nagaraju, R Boraiah - Indonesian Journal of Electrical …, 2022 - academia.edu
Cloud technology is advancing at a rapid pace. Many applications and multimedia data are
hosted in the cloud, Security, confidentiality, and efficiency are the key drawbacks of cloud …

[引用][C] A Novel and Efficient Secure Scheme for Cloud Storage Data with Key Vulnerability

S Manoharn, BVP Reddy

[引用][C] Security in cloud using ciphertext policy attribute-based encryption with checkability

N Rafath, W Ghouri, S Raziuddin - Int. J. Innov. Res. Comput. Commun. Eng, 2015

Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model

YS Rao, R Dutta - Australasian Conference on Information Security and …, 2014 - Springer
This paper proposes an efficient key-policy attribute based signature (ABS) scheme with
constant-size signature for expressive linear secret-sharing scheme (LSSS)-realizable …