In previous privacy-preserving multiauthority attribute-based encryption (PPMA-ABE) schemes, a user can acquire secret keys from multiple authorities with them knowing his/her attributes and furthermore, a central authority is required. Notably, a user's identity information can be extracted from his/her some sensitive attributes. Hence, existing PPMA-ABE schemes cannot fully protect users' privacy as multiple authorities can collaborate to identify a user by collecting and analyzing his attributes. Moreover, ciphertext-policy ABE (CP-ABE) is a more efficient public-key encryption, where the encryptor can select flexible access structures to encrypt messages. Therefore, a challenging and important work is to construct a PPMA-ABE scheme wher...
The notion of attribute-based encryption (ABE)was proposed as an economical alternative to public-ke...
To ensure the security of sensitive data, people need to encrypt them before uploading them to the p...
There is an acceleration of adoption of cloud computing among enterprises. However, moving the infra...
Cipher-policy attribute-based encryption (CP-ABE) is a more efficient and flexible encryption system...
Abstract. Cipher-policy attribute-based encryption (CP-ABE) is a more efficient and flexible encrypt...
A privacy-preserving decentralized ciphertext-policy attribute-based encryption (CP-ABE) scheme is a...
Decentralized attribute-based encryption (ABE) is a variant of a multiauthority ABE scheme where eac...
OAPA Decentralized attribute-based encryption(ABE) is an efficient and flexible multi-authority attr...
can issue the secret key to user independently without any co-operation of a central authority. It m...
The notion of attribute-based encryption (ABE) was proposed as an economical alternative to public-k...
Abstract. In classical encryption schemes, data is encrypted under a single key that is associated w...
With the development of cryptography, the attribute-based encryption (ABE) draws widespread attentio...
Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data pr...
Attribute-based encryption (ABE) as a promising cryptographic primitive in public-key cryptography i...
Attribute based encryption (ABE) [13] determines decryp-tion ability based on a user’s attributes. I...
The notion of attribute-based encryption (ABE)was proposed as an economical alternative to public-ke...
To ensure the security of sensitive data, people need to encrypt them before uploading them to the p...
There is an acceleration of adoption of cloud computing among enterprises. However, moving the infra...
Cipher-policy attribute-based encryption (CP-ABE) is a more efficient and flexible encryption system...
Abstract. Cipher-policy attribute-based encryption (CP-ABE) is a more efficient and flexible encrypt...
A privacy-preserving decentralized ciphertext-policy attribute-based encryption (CP-ABE) scheme is a...
Decentralized attribute-based encryption (ABE) is a variant of a multiauthority ABE scheme where eac...
OAPA Decentralized attribute-based encryption(ABE) is an efficient and flexible multi-authority attr...
can issue the secret key to user independently without any co-operation of a central authority. It m...
The notion of attribute-based encryption (ABE) was proposed as an economical alternative to public-k...
Abstract. In classical encryption schemes, data is encrypted under a single key that is associated w...
With the development of cryptography, the attribute-based encryption (ABE) draws widespread attentio...
Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data pr...
Attribute-based encryption (ABE) as a promising cryptographic primitive in public-key cryptography i...
Attribute based encryption (ABE) [13] determines decryp-tion ability based on a user’s attributes. I...
The notion of attribute-based encryption (ABE)was proposed as an economical alternative to public-ke...
To ensure the security of sensitive data, people need to encrypt them before uploading them to the p...
There is an acceleration of adoption of cloud computing among enterprises. However, moving the infra...