Practical revocable and multi-authority CP-ABE scheme from RLWE for Cloud Computing
Published 2022 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Practical revocable and multi-authority CP-ABE scheme from RLWE for Cloud Computing
Authors
Keywords
Attribute-based encryption, RLWE, Multi-authority, Attribute revocation, Multi-valued attributes
Journal
Journal of Information Security and Applications
Volume 65, Issue -, Pages 103108
Publisher
Elsevier BV
Online
2022-02-10
DOI
10.1016/j.jisa.2022.103108
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computing
- (2021) Zhishuo Zhang et al. Future Generation Computer Systems-The International Journal of eScience
- Server-Aided Revocable Attribute-Based Encryption from Lattices
- (2020) Xingting Dong et al. Security and Communication Networks
- T-CAM: Time-based content access control mechanism for ICN subscription systems
- (2020) Liehuang Zhu et al. Future Generation Computer Systems-The International Journal of eScience
- An Identity-Based and Revocable Data-Sharing Scheme in VANETs
- (2020) Shi-Jinn Horng et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare
- (2020) Hong Zhong et al. Future Generation Computer Systems-The International Journal of eScience
- Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage
- (2019) Voundi Koe Arthur Sandor et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Understanding security failures of multi-factor authentication schemes for multi-server environments
- (2019) Ding Wang et al. COMPUTERS & SECURITY
- An Efficient Attribute-Based Encryption Scheme With Policy Update and File Update in Cloud Computing
- (2019) Jianqiang Li et al. IEEE Transactions on Industrial Informatics
- Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage
- (2018) Jianghong Wei et al. IEEE Systems Journal
- Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme
- (2018) Wei Dai et al. IEEE Transactions on Information Forensics and Security
- Multi-authority fine-grained access control with accountability and its application in cloud
- (2018) Jin Li et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating
- (2018) Zechao Liu et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices
- (2018) Kamil D. Gur et al. IEEE TRANSACTIONS ON COMPUTERS
- Fast Proxy Re-Encryption for Publish/Subscribe Systems
- (2017) Yuriy Polyakov et al. ACM Transactions on Privacy and Security
- Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs
- (2015) Jun Zhou et al. IEEE Transactions on Information Forensics and Security
- An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption
- (2012) Xiao-yuan Yang et al. COMPUTERS & MATHEMATICS WITH APPLICATIONS
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- (2008) Yevgeniy Dodis et al. SIAM JOURNAL ON COMPUTING
Create your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create NowAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started