The issue of data and information security on the internet and social network has become more serious and pervasive in recent years. Cryptography is used to solve security problems. However, message encryption cannot merely meet the intended goals because access control over the encrypted messages is required in some applications. To achieve these requirements, attribute-based encryption (ABE) is used. This type of encryption provides both security and access structure for the network users simultaneously. Fuzzy Identity-Based Encryption (FIBE) is a special mode of ABE that provides a threshold access structure for the users. This threshold value is set by the authority for users, which is always fixed and cannot be changed. So, the sender ...
Decentralized attribute-based encryption (ABE) is a variant of multi-authority based ABE whereby any...
Attribute-based encryption (ABE) enables fine-grained access control on encrypted data and has a lar...
can issue the secret key to user independently without any co-operation of a central authority. It m...
In order to provide access control on encrypted data, Attribute-based encryption (ABE) defines each ...
Abstract. We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Ident...
Abstract—Sahai and Waters introduced a fuzzy id-based encryption (FIBE) scheme in which an identity ...
In this paper we construct two new fuzzy identity-based encryption (IBE) schemes in the random oracl...
Cryptosystems based on the hardness of lattice problems have recently acquired much importance due t...
This work explains the fundamental definitions required to define and create Fuzzy Identity-Based En...
Applying access structure to encrypted sensitive data is one of the challenges in communication netw...
Access control plays an important role in many information systems. Embedding policy-based access co...
There is an acceleration of adoption of cloud computing among enterprises. However, moving the infra...
Security of data is imperative factor in data transmission through network. In this paper, we propos...
Ciphertext policy attribute based encryption (CP-ABE) is a technique in which user with secret ke...
Chosen-ciphertext attacks are typical threat on public-key encryption schemes. We propose a techniqu...
Decentralized attribute-based encryption (ABE) is a variant of multi-authority based ABE whereby any...
Attribute-based encryption (ABE) enables fine-grained access control on encrypted data and has a lar...
can issue the secret key to user independently without any co-operation of a central authority. It m...
In order to provide access control on encrypted data, Attribute-based encryption (ABE) defines each ...
Abstract. We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Ident...
Abstract—Sahai and Waters introduced a fuzzy id-based encryption (FIBE) scheme in which an identity ...
In this paper we construct two new fuzzy identity-based encryption (IBE) schemes in the random oracl...
Cryptosystems based on the hardness of lattice problems have recently acquired much importance due t...
This work explains the fundamental definitions required to define and create Fuzzy Identity-Based En...
Applying access structure to encrypted sensitive data is one of the challenges in communication netw...
Access control plays an important role in many information systems. Embedding policy-based access co...
There is an acceleration of adoption of cloud computing among enterprises. However, moving the infra...
Security of data is imperative factor in data transmission through network. In this paper, we propos...
Ciphertext policy attribute based encryption (CP-ABE) is a technique in which user with secret ke...
Chosen-ciphertext attacks are typical threat on public-key encryption schemes. We propose a techniqu...
Decentralized attribute-based encryption (ABE) is a variant of multi-authority based ABE whereby any...
Attribute-based encryption (ABE) enables fine-grained access control on encrypted data and has a lar...
can issue the secret key to user independently without any co-operation of a central authority. It m...