This brings a huge workload to compute a signature and also a threat to security and privacy if the central authority is compromised. In this paper, we present an outsourced decentralized multi-authority attrib
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising public key encryption primitive enabling fine-grained access control on shared data in public cloud. However, two quite challenging issues, the prevention of key escrow and key abuse, still exist in CP-ABE system. In this ...
Mosaicis a library doing Attribute Based Encryption (ABE). It is meant to be used as a example of a cryptographic core to be embedded in any solution willing to rely on an ABE scheme of this kind (a Multi-Authority CipherText-Policy scheme, see below). ...
Mosaicis a library doing Attribute Based Encryption (ABE). It is meant to be used as a example of a cryptographic core to be embedded in any solution willing to rely on an ABE scheme of this kind (a Multi-Authority CipherText-Policy scheme, see below). ...
Some attribute-based encryption techniques have been proposed to achieve more secure data access control for sharing data in a semi-trusted cloud storage system with multiple attribute authorities. However, based on Dolev–Yao model, security goals such as active attack resistance, confidentiality, ...
Hence, in our scheme, any string can be used as an attribute and the public parameters size does not increase with the size of the attribute universe. Afterwards, we employ the Boneh-Boyen full signature scheme [27] to realize traceability without an identity table. Finally, we prove that ...
Attribute based signature (ABS), which utilizes the signer's attributes to generate private keys, plays a competent role in data authentication and identity privacy preservation. In ABS, there are multiple authorities that issue different private keys for signers based on their various attributes, ...
Recently, efficient fine-grained access mechanism has been studied as a main concern in cloud storage area for several years. Attribute-based signcryption (ABSC) which is logical combination of attribute-based encryption(ABE) and attribute-based signature(ABS), can provide confidentiality, authenticity...
Abstract In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme (ABE), in contrast, is a scheme in which each user is identified by a set of attributes, and some function of those attributes is used to determine decry...
electronic health records; access control; cloud storage; attribute-based encryption; multiple authorities; privacy preservation1. Introduction The modern health industry is adopting Internet of Things (IoT) technology for providing advanced healthcare services [1]. A wide range of IoT devices and ...