CP-ABSc-AODs: CIPHERTEXT-POLICY ATTRIBUTE-BASED SIGNCRYPTION WITH ACCOUNTABLE OUTSOURCED DESIGNCRYPTION-AN ENHANCED SECURE …

VR Catherine, AS Nargunam - Turkish Online Journal of …, 2021 - search.ebscohost.com
Cloud computing is becoming the powerful and popular model to all internet users as they
can use the required resources from the available pool. As users are freed from operational …

An Efficient and Secure Data Sharing Scheme for Ciphertext-Policy Attribute-based Signcryption for Cloud Storage Services

VR Catherine, AS Nargunam - … Conference on I-SMAC (IoT in …, 2022 - ieeexplore.ieee.org
In this paper, an efficient retrievable attribute with Ciphertext-policy attribute-based
signcryption with accountable and verifiable outsourced designcryption (CP-ABSc-AVODs) …

Study and scope of signcryption for cloud data access control

S Debnath, MVL Nunsanga, B Bhuyan - Advances in Computer …, 2019 - Springer
As cloud storage service provides convenience, high computation and a capable service
from local to remote server through the internet; it attracts the user to outsource data from …

Efficient Multi Authority Attribute Based Signcryption

S Uma, CM Ali, E Parthasarathy… - 2023 3rd International …, 2023 - ieeexplore.ieee.org
The security of data kept in the cloud has been an issue of great concern in recent years.
The data is taken from the system regardless of how robust the protection is. One of the most …

Secure sharing of personal health records in cloud computing: Ciphertext-policy attribute-based signcryption

J Liu, X Huang, JK Liu - Future Generation Computer Systems, 2015 - Elsevier
Abstract The sharing of Personal Health Records (PHR) in cloud computing is a promising
platform of health information exchange. However, the storage of personal medical and …

Privacy preserved secured outsourced cloud data access control scheme with efficient multi-authority attribute based signcryption

S Debnath, B Bhuyan, AK Saha - Multiagent and Grid Systems, 2020 - content.iospress.com
Privacy preserved outsourced data access control is a hard task under the control of
third–party storage server. To overcome obstacles in the third party based scenario …

Proud: Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted iot applications

S Belguith, N Kaaniche, M Hammoudeh… - Future Generation …, 2020 - Elsevier
The ever-growing number of Internet connected devices poses several cybersecurity risks.
Most of the exchanged data between the Internet of Things (IoT) devices are not adequately …

Decentralized Privacy Protection Framework Based on Attribute-Based Signcryption

V Sellam, NP Bommana… - Journal of Computational …, 2020 - ingentaconnect.com
In the last decade, the digital world has widely changed how we handle our daily actions on
the internet. India has the second-largest internet users in the globe with about 370 million …

Provably secure attribute based signcryption with delegated computation and efficient key updating

H Hong, Y Xia, Z Sun, X Liu - KSII Transactions on Internet …, 2017 - ink.library.smu.edu.sg
Equipped with the advantages of flexible access control and fine-grained authentication,
attribute based signcryption is diffusely designed for security preservation in many …

An efficient and secure attribute based signcryption scheme with LSSS access structure

H Hong, Z Sun - SpringerPlus, 2016 - Springer
Attribute based encryption (ABE) and attribute based signature (ABS) provide flexible
access control with authentication for data sharing between users, but realizing both …