[PDF][PDF] A survey on attribute based encryption schemes for data sharing

A Rajeev, TS Kenu, R Arun, SS Babu - J Comput Eng, 2016 - researchgate.net
As sensitive data is stored and shared by third party sites on the Internet, there will be a
need to encrypt data stored at these sites. Attribute Based Encryption (ABE) schemes is a …

[PDF][PDF] A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments.

CC Lee, PS Chung, MS Hwang - Int. J. Netw. Secur., 2013 - ijns.jalaxy.com.tw
Abstract In Attribute-based Encryption (ABE) scheme, attributes play a very important role.
Attributes have been exploited to generate a public key for encrypting data and have been …

A Review Paper on Attribute-Based Encryption for Message Privacy In Cloud

J Deshmukh, G Bhandari - … In Technology (AJCT) ISSN-2350-1146, 2019 - asianssr.org
The notion of attribute-based encryption (ABE) was proposed as an economical alternative
to public-key infrastructures. It is the set of descriptive attributes, used as an identity to …

A Brief Review on Attribute-Based Encryption Approaches

T Khoachev - Available at SSRN 4526403, 2023 - papers.ssrn.com
Abstract Attribute-Based Encryption (ABE) has emerged as a promising cryptographic
technique that enables fine-grained access control and secure data sharing in various …

An Attribute-Based Encryption Method Using Outsourced Decryption and Hierarchical Access Structure

TN Mujawar, LB Bhajantri - Journal of Telecommunications and …, 2022 - yadda.icm.edu.pl
Cloud computing is being rapidly adopted by many organizations from different domains
and large amounts of data is stored in the cloud. In order to ensure data security, the …

[PDF][PDF] Hierarchical attribute based encryption in cloud environment

S Kapadnis - International Journal of Computer Applications, 2014 - Citeseer
In the IT industry cloud computing is considered as one of the most important paradigms. In
cloud computing we have to store our data at cloud providers place. While doing data …

Ciphertext-Policy Attribute-Based Encryption for Access Control of Data in Cloud

VL Paruchuri, NL Anantha, VL Konagala… - International Journal of …, 2016 - earticle.net
In Distributed systems, the users with a certain set of attributes can only be able to access
the data. At present this process can be done through a trusted server where we will store …

Data owner based attribute based encryption

J Zhang, XA Wang, J Ma - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
These years attribute based encryption (ABE) is a very hot research topic for its very flexible
control on the encrypted content. Typically, there are three parties in an attribute based …

Applying attribute-based encryption on mobile devices

NT Dang, HD Le, ST Le… - VNUHCM …, 2020 - stdjet.scienceandtechnology.com.vn
The 21st century has witnessed the rapid development of small and convenient mobile
devices such as smartphones, tablets, game players, sensor nodes, etc. The rise of such …

[引用][C] Analysis and Security based on Attribute based Encryption for data Sharing

MSV Gadge - International Journal of Emerging Research in …, 2014