attribute-based encryptionfine-grained access controlSM9 AlgorithmDispatching and Control Cloud (DCC) is a cloud platform constructed by State Grid Corporation with the technology of cloud computing. DCC has im
Ciphertext Policy Attribute-Based Encryption (CP-ABE), as a commonly used one-to-many encryption algorithm, can allow users to perform fine-grained access control on the encrypted data. Intuitively, the CP-ABE is helpful in ensuring the security of smart healthcare systems. In this case, the...
1. Technique 1.1 Attribute-Based Encryption 基于属性加密机制 ABE机制是指将数据和数据用户属性相关联的一组规则,以提供对数据的访问控制。 1.2 Chameleon Hash Algorithm 变色龙哈希 人为设下一个“后门”(私钥)。掌握了它就能轻松找到碰撞,其中 m 不等于 m′ 。假设一个区块原内容为m,有个人知道这个哈希的“...
Attribute-based encryption (ABE) provides a fine-grained access control mode for multiuser network environments. The popularity of 5th generation (5G) mobile network applications has greatly increased the data transmission rate, but mobile terminal devices with limited resources in the network have diffi...
Ciphertext Policy Attribute Based Encryption presents a promising approach in access control and encryption in a Cloud Computing environment. In this paper, we exposed a Traceable, Revocable, accountable and Key escrow free (TRAK-CPABE) solution. It ensures white-box traceability, adds a match then...
If the set S of attributes satisfies the access structure A then the algorithm will decrypt the ciphertext and return a message M . We now describe a security model for ciphertext-policy ABE schemes. Like identity-based encryption schemes [37, 13, 24] the security model allows the adversary...
We propose a hidden ciphertext-policy attribute-based proxy re-encryption scheme. A data owner can delegate the capability of transforming a ciphertext under an access policy to another one with the same plaintext but different access policy to a semi-tr
Retrieves the object identifier (OID) of the symmetric encryption algorithm used to encrypt the private key.
In the encryption algorithm in the scheme proposed in this work, if there is a weight attribute of teaching assistant in the access structure, our scheme only needs to generate one ciphertext related to the teaching assistant; while in the traditional method, it needs to generate separate ...
Towards Robust IoT Security: A Blockchain Design with Attribute-Based Encryption Chapter © 2024 Securing Data Provenance in Internet of Things (IoT) Systems Chapter © 2017 Analysis of Retractable Attribute Base Encryption Algorithm for Internet of Things Driven by Blockchain Chapter © ...