Attribute-based encryption for cloud computing access control: A survey

Y Zhang, RH Deng, S Xu, J Sun, Q Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …

Mis: A multi-identifier management and resolution system in the metaverse

H Wang, H Li, A Smahi, F Zhao, Y Yao… - ACM Transactions on …, 2024 - dl.acm.org
The metaverse gradually evolves into a virtual world containing a series of interconnected
sub-metaverses. Diverse digital resources, including identities, contents, services, and …

A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices

M Xie, Y Ruan, H Hong, J Shao - Future Generation Computer Systems, 2021 - Elsevier
With the rapid development of cloud computing, the ensuing security issues have become
increasingly prominent. In this context, attribute-based encryption (ABE) has gradually …

Security analysis of a decentralized, revocable and verifiable attribute-based encryption scheme

T Prantl, M Lauer, L Horn, S Engel, D Dingel… - Proceedings of the 19th …, 2024 - dl.acm.org
In recent years, digital services have experienced significant growth, exemplified by
platforms like Netflix achieving unprecedented revenue levels. Some of these services …

Revocable, dynamic and decentralized data access control in cloud storage

C Wang, H Jin, R Wei, K Zhou - The Journal of Supercomputing, 2022 - Springer
Attribute-based encryption (ABE) can enable user-centered data sharing in untrusted cloud
scenario where users usually lack control on their outsourced data. However, existing ABE …

MIS: A multi-identifier management and resolution system based on consortium blockchain in metaverse

H Wang, H Li, A Smahi, F Zhao, Y Yao… - arXiv preprint arXiv …, 2023 - arxiv.org
The metaverse gradually evolves into a virtual world containing a series of interconnected
sub-metaverses. Diverse digital resources, including identities, contents, services, and …

[PDF][PDF] Towards a cryptography encyclopedia: a survey on attribute-based encryption

T Prantl, T Zeck, L Horn, L Iffländer, A Bauer… - J. Surveill. Secur …, 2023 - f.oaes.cc
Access control, a key feature of digital business models, such as streaming, relies on the
implementation of encryption schemes. The diverse use of encryption schemes has led to …

Speech encryption scheme based on ciphertext policy hierarchical attribute in cloud storage

Q Zhang, Z Zhao, M Fu - Security and Communication …, 2021 - Wiley Online Library
In order to ensure the confidentiality and secure sharing of speech data, and to solve the
problems of slow deployment of attribute encryption systems and fine‐grained access …

Towards a cryptography benchmark: A view on attribute based encryption schemes

T Prantl, T Zeck, L Iffländer, L Beierlieb… - 2022 5th Conference …, 2022 - ieeexplore.ieee.org
In many Internet-of-Things (IoT) scenarios-such as smart home, or intelligent traffic systems-
groups of devices interact with each other. Such scenarios no longer require encryption for …

Innovations in Cloud Security: Enhanced Hybrid Encryption Approach with AuthPrivacyChain for Enhanced Scalability

V Ananthakrishna, CS Yadav - Nanotechnology Perceptions, 2024 - nano-ntp.com
Security is of utmost importance in the dynamic field of cloud computing. This study offers a
comprehensive analysis of the latest advancements in cloud security, focusing specifically …