Efficiently revocable and searchable attribute-based encryption scheme for mobile cloud storage

S Wang, D Zhang, Y Zhang, L Liu - IEEE Access, 2018 - ieeexplore.ieee.org
Attribute-based encryption (ABE) is suitable for mobile cloud storage to protect data
confidentiality and realize fine-grained data access control. It is essential for ABE schemes …

On the optimal succinctness and efficiency of functional encryption and attribute-based encryption

A Jain, H Lin, J Luo - Annual International Conference on the Theory and …, 2023 - Springer
We investigate the best-possible (asymptotic) efficiency of functional encryption (FE) and
attribute-based encryption (ABE) by proving inherent space-time trade-offs and constructing …

[HTML][HTML] Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice

M Venema, G Alpár, JH Hoepman - Designs, Codes and Cryptography, 2023 - Springer
Attribute-based encryption (ABE) cryptographically implements fine-grained access control
on data. As such, data can be stored by an entity that is not necessarily trusted to enforce …

ABE for circuits with constant-size secret keys and adaptive security

H Li, H Lin, J Luo - Theory of Cryptography Conference, 2022 - Springer
An important theme in the research on attribute-based encryption (ABE) is minimizing the
sizes of secret keys and ciphertexts. In this work, we present two new ABE schemes with …

An SKP‐ABE Scheme for Secure and Efficient Data Sharing in Cloud Environments

YW Hwang, SH Kim, D Seo… - … and Mobile Computing, 2022 - Wiley Online Library
Security threats such as data forgery and leakage may occur when sharing data in cloud
environments. Therefore, it is important to encrypt your data and securely access it when …

Verifiable outsourced decryption of encrypted data from heterogeneous trust networks

C Hahn, J Kim - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Cloud-based Internet of Things (IoT) management services can be utilized to acquire data
from devices at any point on Earth. Accordingly, controlling access to data managed by …

[图书][B] Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon …

S Moriai, H Wang - 2020 - books.google.com
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings
of the 26th International Conference on the Theory and Application of Cryptology and …

Security and efficiency enhanced revocable access control for fog-based smart grid system

M Wen, S Chen, R Lu, B Li, S Chen - IEEE Access, 2019 - ieeexplore.ieee.org
With the popularity of smart grids, plentiful of smart devices have been put into use, such as
smart meters and power assets. Due to limited computation capabilities and storage spaces …

Achieving privacy-preserving CP-ABE access control with multi-cloud

C Li, J He, C Lei, C Guo, K Zhou - … IEEE Intl Conf on Parallel & …, 2018 - ieeexplore.ieee.org
Cloud storage service makes it very convenient for people to access and share data. At the
same time, the confidentiality and privacy of user data is also facing great challenges …

Catch me if you can: A Secure Bilateral Access Control System With Anonymous Credentials

J Ma, S Xu, J Ning, X Huang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Bilateral access control model, emerging as a novel paradigm in access control, has
garnered extensive deployment within the domain of fog computing. This model offers on …