A decentralized strongly secure attribute-based encryption and authentication scheme for distributed Internet of Mobile ThingsDistributed IoT-assisted cloud computingMulti-authority CP-ABE (MA-CP-ABE)Zero knowl
In this paper, a new traceable and revocable decentralized attribute-based encryption scheme with a fully hidden access policy named TR-HP-DABE is proposed for the first time, which addresses concerns about user privacy, malicious user traceability, and revocability in cloud-based smart healthcare...
Multi-authority attribute-based encryption (ABE) refers to an ABE system that allows multiple authorities managing disjoint attribute sets to distribute decryption keys for authorized users and can be roughly divided into two categories, namely, (centralized) multi-authority ABE (Chase,2007) and decen...
Decentralized attribute-based encryption (ABE) is a special form of multiauthority ABE systems, in which no central authority and global coordination are required other than creating the common reference parameters. In this paper, we propose a new decentralized ABE in prime-order groups by using ex...
We construct the first decentralized multi-authority attribute-based encryption (𝖬𝖠-𝖠𝖡𝖤) scheme for a non-trivial class of access policies whose security is based (in the random oracle model) solely on the Learning With Errors (LWE) assumption. The supported access policies are ones...
Attribute Based Encryption (ABE) Secure Data retrievalTrust managementIn extreme wireless network environment, Mobile Nodes suffers from inter communication such as military networks and hostile environments. Disruption Tolerant NElumalaivasanKulothungan...
We provide a formal security model for traceable attribute-based signatures. Our focus is on the more practical case where attribute management is distributed among different authorities rather than relying on a single central authority. By specializing our model to the single attribute authority setting...
This software implements the Decentralized CiphertextPolicy Attribute Based Encryption schema described in [1]. The code depends on the jPBC library [2] and the BouncyCastle library. The software is a result of the PriSM project [3] developed by the SANDS [4] team at the Nanyang Technological...
The proposed EPSDSS system uses cutting-edge cryptographic techniques, including proxy re-encryption and attribute-based encryption, to allow fine-grained control over who has access to what in a shared database. A decentralized trust management system reduces the risks associated with centralized trust...
Ciphertextpolicy attribute-based encryption (CP-ABE) is a promising cryptographic... S Sugunan,A Azeez 被引量: 0发表: 2015年 Secure Data Key Retrieval for Decentralized Disruption Tolerant Military Networks The Ciphertext policy based encryption has a cryptographic solution to the access control ...