[HTML][HTML] Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing

A Wu, D Zheng, Y Zhang, M Yang - Sensors, 2018 - mdpi.com
Attribute-based encryption can be used to realize fine-grained data sharing in open
networks. However, in practical applications, we have to address further challenging issues …

An efficient and revocable attribute-based data sharing scheme with rich expression and escrow freedom

C Lan, L Liu, C Wang, H Li - Information Sciences, 2023 - Elsevier
Attribute-based encryption effectively realizes fine-grained access control by using
attributes. It provides an ideal access control strategy for new computing environments with …

EABDS: Attribute‐Based Secure Data Sharing with Efficient Revocation in Cloud Computing

Q Huang, Z Ma, Y Yang, J Fu… - Chinese Journal of …, 2015 - Wiley Online Library
Ciphertext‐policy attribute‐based encryption (CP‐ABE) is becoming a promising solution to
guarantee data security in cloud computing. In this paper, we present an attribute‐based …

Secure attribute-based data sharing for resource-limited users in cloud computing

J Li, Y Zhang, X Chen, Y Xiang - Computers & Security, 2018 - Elsevier
Data sharing becomes an exceptionally attractive service supplied by cloud computing
platforms because of its convenience and economy. As a potential technique for realizing …

[PDF][PDF] Attribute-based data sharing with flexible and direct revocation in cloud computing

Y Zhang, X Chen, J Li, H Li, F Li - KSII Transactions on Internet and …, 2014 - koreascience.kr
Attribute-based encryption (ABE) is a promising cryptographic primitive for implementing fine-
grained data sharing in cloud computing. However, before ABE can be widely deployed in …

Attribute-based data access control scheme with secure revocation in fog computing for smart grid

Z Wu, R Shi, K Li, Y Yang - Cluster Computing, 2022 - Springer
Smart grid requires sharing sensitive data to external researchers. Attribute encryption is a
common technique used in data sharing. Unfortunately, existing revocation mechanisms do …

Comments on “attribute-based data sharing scheme revisited in cloud computing”

C Lan, C Wang, H Li, L Liu - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
In this letter, we discuss the security weakness of Wang et al.'s attribute-based data sharing
scheme, in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY …

[HTML][HTML] Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage

S Wang, T Gao, Y Zhang - PloS one, 2018 - journals.plos.org
With the development of outsourcing data services, data security has become an urgent
problem that needs to be solved. Attribute-based encryption is a valid solution to data …

Attribute-based access control scheme with efficient revocation in cloud computing

Z Xia, L Zhang, D Liu - China Communications, 2016 - ieeexplore.ieee.org
Attribute-based encryption (ABE) supports the fine-grained sharing of encrypted data. In
some common designs, attributes are managed by an attribute authority that is supposed to …

Efficient and privacy-aware attribute-based data sharing in mobile cloud computing

Y Zhang, A Wu, D Zheng - Journal of Ambient Intelligence and Humanized …, 2018 - Springer
In the era of cloud computing, it is convenient to share large-scale data among various kinds
of users. As a kind of attribute-based encryption, ciphertext-policy attribute-based encryption …