In an attribute-based system (ABS), users are identified by various attributes, instead of their identities. Since its seminal introduction, the attribute-based mechanism has attracted a lot of attention. However, current ABS schemes have a number of drawbacks: (i) the communication cost is linear in the number of the required attributes; (ii) the computation cost is linear in the number of the required attributes and (iii) there are no efficient verification algorithms for the secret keys. These drawbacks limit the use of ABS in practice. In this paper, we propose an attribute-based oblivious access control (ABOAC) scheme to address these problems, where only the receiver whose attributes satisfy the access policies can obtain services obl...
[[abstract]]In Attribute-based Encryption (ABE) scheme, attributes play a very important role. Attri...
As an important method of protecting data confidentiality in the Internet of Things (IoT), access co...
International audienceAn Attribute-based signature (ABS), is a cryptographic scheme where someone ca...
In an attribute-based system (ABS), users are identified by various attributes, instead of their ide...
In an attribute-based system (ABS), users are identified by various attributes, instead of their ide...
Smart cities require new access control models for Internet of Things (IoT) devices that preserve us...
Information flow control (IFC) mechanisms regulate where information is allowed to travel. To enhanc...
This thesis examines a new approach to attribute-based access control with hidden policies and hidde...
Abstract—In an open environment such as the Internet, the decision to collaborate with a stranger (e...
A ciphertext policy-attribute based encryption(CP-ABE) scheme can be used to realize access control ...
Abstract An access control system is needed to ensure only authorized users can access a sensitive r...
Abstract. Attribute-based Access Control (ABAC) extends traditional Access Control by considering an...
Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet of Th...
The notion of oblivious transfer with hidden access control policies (HACOT) was recently proposed b...
The notion of attribute-based encryption (ABE) was proposed as an economical alternative to public-k...
[[abstract]]In Attribute-based Encryption (ABE) scheme, attributes play a very important role. Attri...
As an important method of protecting data confidentiality in the Internet of Things (IoT), access co...
International audienceAn Attribute-based signature (ABS), is a cryptographic scheme where someone ca...
In an attribute-based system (ABS), users are identified by various attributes, instead of their ide...
In an attribute-based system (ABS), users are identified by various attributes, instead of their ide...
Smart cities require new access control models for Internet of Things (IoT) devices that preserve us...
Information flow control (IFC) mechanisms regulate where information is allowed to travel. To enhanc...
This thesis examines a new approach to attribute-based access control with hidden policies and hidde...
Abstract—In an open environment such as the Internet, the decision to collaborate with a stranger (e...
A ciphertext policy-attribute based encryption(CP-ABE) scheme can be used to realize access control ...
Abstract An access control system is needed to ensure only authorized users can access a sensitive r...
Abstract. Attribute-based Access Control (ABAC) extends traditional Access Control by considering an...
Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet of Th...
The notion of oblivious transfer with hidden access control policies (HACOT) was recently proposed b...
The notion of attribute-based encryption (ABE) was proposed as an economical alternative to public-k...
[[abstract]]In Attribute-based Encryption (ABE) scheme, attributes play a very important role. Attri...
As an important method of protecting data confidentiality in the Internet of Things (IoT), access co...
International audienceAn Attribute-based signature (ABS), is a cryptographic scheme where someone ca...