A decade of lattice cryptography

C Peikert - Foundations and trends® in theoretical computer …, 2016 - nowpublishers.com
Lattice-based cryptography is the use of conjectured hard problems on point lattices in Rn
as the foundation for secure cryptographic systems. Attractive features of lattice cryptography …

Attribute-based encryption for cloud computing access control: A survey

Y Zhang, RH Deng, S Xu, J Sun, Q Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …

Security and privacy in smart health: Efficient policy-hiding attribute-based access control

Y Zhang, D Zheng, RH Deng - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
With the rapid development of the Internet of Things and cloud computing technologies,
smart health (s-health) is expected to significantly improve the quality of health care …

Secure cloud-based EHR system using attribute-based cryptosystem and blockchain

H Wang, Y Song - Journal of medical systems, 2018 - Springer
To achieve confidentiality, authentication, integrity of medical data, and support fine-grained
access control, we propose a secure electronic health record (EHR) system based on …

Secure attribute-based data sharing for resource-limited users in cloud computing

J Li, Y Zhang, X Chen, Y **ang - computers & security, 2018 - Elsevier
Data sharing becomes an exceptionally attractive service supplied by cloud computing
platforms because of its convenience and economy. As a potential technique for realizing …

Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges

J Domingo-Ferrer, O Farras, J Ribes-González… - Computer …, 2019 - Elsevier
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …

Registered attribute-based encryption

S Hohenberger, G Lu, B Waters, DJ Wu - Annual International Conference …, 2023 - Springer
Attribute-based encryption (ABE) generalizes public-key encryption and enables fine-
grained control to encrypted data. However, ABE upends the traditional trust model of public …

Decentralizing attribute-based encryption

A Lewko, B Waters - Annual international conference on the theory and …, 2011 - Springer
Abstract We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our
system, any party can become an authority and there is no requirement for any global …

Outsourcing the decryption of {ABE} ciphertexts

M Green, S Hohenberger, B Waters - 20th USENIX security symposium …, 2011 - usenix.org
Attribute-based encryption (ABE) is a new vision for public key encryption that allows users
to encrypt and decrypt messages based on user attributes. For example, a user can create a …

Fully homomorphic encryption over the integers

M Van Dijk, C Gentry, S Halevi… - Advances in Cryptology …, 2010 - Springer
We construct a simple fully homomorphic encryption scheme, using only elementary
modular arithmetic. We use Gentry's technique to construct a fully homomorphic scheme …