TABE-DAC: Efficient traceable attribute-based encryption scheme with dynamic access control based on blockchain

L Guo, X Yang, WC Yau - IEEE Access, 2021 - ieeexplore.ieee.org
The features of decentralization and tamper-proof enable blockchain to be an emerging
technology for integrity protection of important data stored on it. Blockchains are also used to …

Multiauthority attribute-based encryption for assuring data deletion

J Li, R Zhang, Y Lu, J Han, Y Zhang… - IEEE Systems …, 2022 - ieeexplore.ieee.org
In order to alleviate key escrow issue, the notion of multiauthority attribute-based encryption
(MA-ABE) was presented, which was widely applied in cloud storage environment. In data …

A pairing-based cryptographic approach for data security in the cloud

M Morales-Sandoval, JL Gonzalez-Compean… - International Journal of …, 2018 - Springer
This paper presents AES4SeC, a security scheme fully constructed over cryptographic
pairings. The main building blocks of AES4SeC are attribute-based encryption (ABE) and …

Trak-cpabe: a novel traceable, revocable and accountable ciphertext-policy attribute-based encryption scheme in cloud computing

M Bouchaala, C Ghazel, LA Saidane - Journal of Information Security and …, 2021 - Elsevier
Abstract Ciphertext Policy Attribute Based Encryption (CPABE) offers fine-grained access
control in Cloud Computing environment. It is considered as the most promising one-to …

EABDS: Attribute‐Based Secure Data Sharing with Efficient Revocation in Cloud Computing

Q Huang, Z Ma, Y Yang, J Fu… - Chinese Journal of …, 2015 - Wiley Online Library
Ciphertext‐policy attribute‐based encryption (CP‐ABE) is becoming a promising solution to
guarantee data security in cloud computing. In this paper, we present an attribute‐based …

A survey on secured data sharing using ciphertext policy attribute based encryption in cloud

GA Thushara, SMS Bhanu - 2021 8th International Conference …, 2021 - ieeexplore.ieee.org
Cloud computing facilitates the access of applications and data from any location by using
any device with an internet connection. It enables multiple applications and users to access …

An efficient predicate encryption with constant pairing computations and minimum costs

I Kim, SO Hwang, JH Park… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Predicate encryption is a public-key encryption that supports attribute-hiding as well as
payload-hiding and achieves high flexibility in terms of access control. Since Katz, Sahai …

A Key Escrow-Free KP-ABE Scheme and Its Application in Stand-Alone Authentication in IoT

X He, L Li, H Peng - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
When users access the Internet of Things (IoT) devices, authenticating their identities and
permissions is an important measure to ensure system security and achieve access control …

A Novel User Collusion‐Resistant Decentralized Multi‐Authority Attribute‐Based Encryption Scheme Using the Deposit on a Blockchain

S Noh, D Kim, Z Cai, KH Rhee - Wireless Communications and …, 2021 - Wiley Online Library
Recently, the concept of a decentralized data marketplace is getting much attention to
exchange user data. Multi‐authority attribute‐based encryption (ABE), which can provide …

[PDF][PDF] Secure data storage and data retrieval in cloud storage using cipher policy attribute based encryption

R Saikeerthana… - Indian Journal …, 2015 - sciresol.s3.us-east-2.amazonaws …
Cloud is an arising and a massive technical development of this modern era which offers
variety of services to satisfy the needs of multiple users. Cloud technology has various …