With the increasing number of emerging robust networks, the challenges to design new security protocols and techniques are never ending. With the enlargement of 5G paradigm …
In a traditional attribute-based encryption (ABE) system, there is only one central authority who generates and hence knows the secret keys of all users, this problem is known as the …
X Yan, S Tu, H Alasmary, F Huang - Applied Sciences, 2023 - mdpi.com
Fog computing accredits by utilizing the network edge while still rendering the possibility to interact with the cloud. Nevertheless, the features of fog computing are encountering several …
S Canard, DH Phan, D Pointcheval, VC Trinh - Theoretical Computer …, 2018 - Elsevier
Abstract Standard Broadcast Encryption (BE) and Attribute-Based Encryption (ABE) aim at sending a content to a large arbitrary group of users at once. Regarding Broadcast …
D Kumar, M Kumar, G Gupta - International Journal of Modeling …, 2023 - World Scientific
The Internet of Things (IoT) is a new technology that has drawn interest from both industry and academia in the modern digital era. The IoT provides a platform for any device to …
PP Nayudu, KR Sekhar - … Journal of System Assurance Engineering and …, 2022 - Springer
Ciphertext attribute-based encryption is a proven mechanism for providing the privacy and security for the shared resources in the cloud. However, the issues that are concerned with …
TVX Phuong - Designs, Codes and Cryptography, 2024 - Springer
Due to the high demands of data communication, the broadcasting system streams the data daily. This service not only sends out the message to the correct participant but also respects …
Broadcast encryption (BE) allows a sender to encrypt a message to an arbitrary target set of legitimate users and to prevent non-legitimate users from recovering the broadcast …