A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computing
Published 2021 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computing
Authors
Keywords
Hidden policy CP-ABE (HP-CP-ABE), Against attribute values guessing attacks (AVGA), Online privacy-protective decryption testing algorithm
Journal
Future Generation Computer Systems-The International Journal of eScience
Volume 123, Issue -, Pages 181-195
Publisher
Elsevier BV
Online
2021-05-12
DOI
10.1016/j.future.2021.04.022
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Efficient and Secure Attribute Based Access Control Architecture for Smart Healthcare
- (2020) Saurabh Rana et al. JOURNAL OF MEDICAL SYSTEMS
- Searchable encryption cloud storage with dynamic data update to support efficient policy hiding
- (2020) Laicheng Cao et al. China Communications
- TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain
- (2020) Sheng Gao et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health
- (2020) Jianfei Sun et al. IEEE Internet of Things Journal
- Offline/Online Outsourced Attribute-Based Encryption with Partial Policy Hidden for the Internet of Things
- (2020) Xixi Yan et al. Journal of Sensors
- A Novel Multiserver Authentication Scheme Using Proxy Resignature With Scalability and Strong User Anonymity
- (2020) Hu Xiong et al. IEEE Systems Journal
- A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection
- (2020) Dezhi Han et al. IEEE Transactions on Dependable and Secure Computing
- Heterogeneous Signcryption With Equality Test for IIoT Environment
- (2020) Hu Xiong et al. IEEE Internet of Things Journal
- Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption
- (2020) Intae Kim et al. IEEE Transactions on Dependable and Secure Computing
- Efficient and privacy-preserving traceable attribute-based encryption in blockchain
- (2019) Axin Wu et al. Annals of Telecommunications
- A provably secure certificateless public key encryption with keyword search
- (2019) Tsu-Yang Wu et al. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS
- Fine-grained data access control with attribute-hiding policy for cloud-based IoT
- (2019) Jialu Hao et al. Computer Networks
- Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures
- (2019) Yang Chen et al. COMPUTER JOURNAL
- Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing
- (2019) Hu Xiong et al. Future Generation Computer Systems-The International Journal of eScience
- PoRX: A reputation incentive scheme for blockchain consensus of IIoT
- (2019) Eric Ke Wang et al. Future Generation Computer Systems-The International Journal of eScience
- Server-Aided Attribute-Based Signature Supporting Expressive Access Structures for Industrial Internet of Things
- (2019) Hu Xiong et al. IEEE Transactions on Industrial Informatics
- Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control
- (2018) Yinghui Zhang et al. IEEE Internet of Things Journal
- On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags
- (2017) King-Hang Wang et al. JOURNAL OF SUPERCOMPUTING
- An Efficient and Fine-Grained Big Data Access Control Scheme With Privacy-Preserving Policy
- (2017) Kan Yang et al. IEEE Internet of Things Journal
- Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions
- (2016) Tran Viet Xuan Phuong et al. IEEE Transactions on Information Forensics and Security
- Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack
- (2016) Shuo Qiu et al. Science China-Information Sciences
- Security in cloud computing: Opportunities and challenges
- (2015) Mazhar Ali et al. INFORMATION SCIENCES
- A view of cloud computing
- (2010) Michael Armbrust et al. COMMUNICATIONS OF THE ACM
- Cloud computing — The business perspective
- (2010) Sean Marston et al. DECISION SUPPORT SYSTEMS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started