An identity-based and revocable data-sharing scheme in VANETs

SJ Horng, CC Lu, W Zhou - IEEE Transactions on Vehicular …, 2020 - ieeexplore.ieee.org
Ensuring data confidentiality in a vehicular ad hoc network (VANET) is an increasingly
important issue. Message confidentiality, user privacy and access control are the most …

A survey on secure communication techniques for 5G wireless heterogeneous networks

A Kakkar - Information Fusion, 2020 - Elsevier
With the increasing number of emerging robust networks, the challenges to design new
security protocols and techniques are never ending. With the enlargement of 5G paradigm …

Decentralized ciphertext-policy attribute-based encryption schemes for lightweight devices

QM Malluhi, A Shikfa, VD Tran, VC Trinh - Computer Communications, 2019 - Elsevier
In a traditional attribute-based encryption (ABE) system, there is only one central authority
who generates and hence knows the secret keys of all users, this problem is known as the …

Multiauthority Ciphertext Policy-Attribute-Based Encryption (MA-CP-ABE) with Revocation and Computation Outsourcing for Resource-Constraint Devices

X Yan, S Tu, H Alasmary, F Huang - Applied Sciences, 2023 - mdpi.com
Fog computing accredits by utilizing the network edge while still rendering the possibility to
interact with the cloud. Nevertheless, the features of fog computing are encountering several …

[HTML][HTML] A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption

S Canard, DH Phan, D Pointcheval, VC Trinh - Theoretical Computer …, 2018 - Elsevier
Abstract Standard Broadcast Encryption (BE) and Attribute-Based Encryption (ABE) aim at
sending a content to a large arbitrary group of users at once. Regarding Broadcast …

A survey on attribute-based encryption for Internet of Things

D Kumar, M Kumar, G Gupta - International Journal of Modeling …, 2023 - World Scientific
The Internet of Things (IoT) is a new technology that has drawn interest from both industry
and academia in the modern digital era. The IoT provides a platform for any device to …

Accountable specific attribute-based encryption scheme for cloud access control

PP Nayudu, KR Sekhar - … Journal of System Assurance Engineering and …, 2022 - Springer
Ciphertext attribute-based encryption is a proven mechanism for providing the privacy and
security for the shared resources in the cloud. However, the issues that are concerned with …

智慧城市中隐私保护性广播加密算法.

牛淑芬, 方丽芝, 宋蜜, 王彩芬… - Computer Engineering & …, 2022 - search.ebscohost.com
现代化城市公共部门和市民社交网络会产生大量的数据, 这些海量数据的使用和处理主要依赖
现代化信息通信技术和网络技术. 为了保护用户隐私和数据安全, 在数据传输过程中采用加密 …

Anonymous attribute-based broadcast encryption with hidden multiple access structures

TVX Phuong - Designs, Codes and Cryptography, 2024 - Springer
Due to the high demands of data communication, the broadcasting system streams the data
daily. This service not only sends out the message to the correct participant but also respects …

Decentralized broadcast encryption schemes with constant size ciphertext and fast decryption

Q Malluhi, VD Tran, VC Trinh - Symmetry, 2020 - mdpi.com
Broadcast encryption (BE) allows a sender to encrypt a message to an arbitrary target set of
legitimate users and to prevent non-legitimate users from recovering the broadcast …