Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
Published 2016 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
Authors
Keywords
Attribute-based encryption, Fuzzy access policy, Policy hidden, Cloud storage
Journal
SOFT COMPUTING
Volume 22, Issue 1, Pages 243-251
Publisher
Springer Nature
Online
2016-09-02
DOI
10.1007/s00500-016-2330-8
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks
- (2018) Debiao He et al. IEEE Systems Journal
- Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions
- (2016) Tran Viet Xuan Phuong et al. IEEE Transactions on Information Forensics and Security
- An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing
- (2016) Shulan Wang et al. IEEE Transactions on Information Forensics and Security
- Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates
- (2016) Jia Yu et al. IEEE Transactions on Information Forensics and Security
- A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data
- (2016) Zhihua Xia et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems
- (2016) Hao Wang et al. JOURNAL OF HIGH SPEED NETWORKS
- Cost-Effective Authentic and Anonymous Data Sharing with Forward Security
- (2015) Xinyi Huang et al. IEEE TRANSACTIONS ON COMPUTERS
- Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption
- (2015) Zhibin Zhou et al. IEEE TRANSACTIONS ON COMPUTERS
- Verifiable Auditing for Outsourced Database in Cloud Computing
- (2015) Jianfeng Wang et al. IEEE TRANSACTIONS ON COMPUTERS
- Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild
- (2015) Zhen Liu et al. IEEE Transactions on Information Forensics and Security
- Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption
- (2015) Jinguang Han et al. IEEE Transactions on Information Forensics and Security
- Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing
- (2015) Zhangjie FU et al. IEICE TRANSACTIONS ON COMMUNICATIONS
- Achieving Efficient Cloud Search Services: Multi-Keyword Ranked Search over Encrypted Cloud Data Supporting Parallel Computing
- (2015) Zhangjie FU et al. IEICE TRANSACTIONS ON COMMUNICATIONS
- Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds
- (2014) Sushmita Ruj et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
- (2013) Kan Yang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started