Key escrow-free attribute based encryption with user revocation

R Zhang, J Li, Y Lu, J Han, Y Zhang - Information Sciences, 2022 - Elsevier
There exists a key escrow issue in ciphertext-policy attribute-based encryption (CP-ABE).
The key generator center issues all users' secret keys and can decrypt each ciphertext by …

Improving privacy and security in multi-authority attribute-based encryption

M Chase, SSM Chow - Proceedings of the 16th ACM conference on …, 2009 - dl.acm.org
Attribute based encryption (ABE)[13] determines decryption ability based on a user's
attributes. In a multi-authority ABE scheme, multiple attribute-authorities monitor different …

Improving security and efficiency in attribute-based data sharing

J Hur - IEEE transactions on knowledge and data engineering, 2011 - ieeexplore.ieee.org
With the recent adoption and diffusion of the data sharing paradigm in distributed systems
such as online social networks or cloud computing, there have been increasing demands …

Attribute-based data sharing scheme revisited in cloud computing

S Wang, K Liang, JK Liu, J Chen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) is a very promising encryption
technique for secure data sharing in the context of cloud computing. Data owner is allowed …

Efficient registration-based encryption

N Glaeser, D Kolonelos, G Malavolta… - Proceedings of the 2023 …, 2023 - dl.acm.org
Registration-based encryption (RBE) was recently introduced as an alternative to identity-
based encryption (IBE), to resolve the key-escrow problem: In RBE, the trusted authority is …

A survey on attribute-based signatures

PSK Oberko, VHKS Obeng, H **ong… - Journal of Systems …, 2022 - Elsevier
Abstract Attribute-Based Signature (ABS), where messages are signed concerning a signing
strategy conveyed as predicates, provides a necessary platform for implementing fine …

Registration-based encryption: removing private-key generator from IBE

S Garg, M Hajiabadi, M Mahmoody… - Theory of Cryptography …, 2018 - Springer
In this work, we introduce the notion of registration-based encryption (RBE for short) with the
goal of removing the trust parties need to place in the private-key generator in an IBE …

Match me if you can: Matchmaking encryption and its applications

G Ateniese, D Francati, D Nuñez, D Venturi - Advances in Cryptology …, 2019 - Springer
We introduce a new form of encryption that we name matchmaking encryption (ME). Using
ME, sender S and receiver R (each with its own attributes) can both specify policies the other …

Dynamic secure cloud storage with provenance

SSM Chow, CK Chu, X Huang, J Zhou… - Cryptography and Security …, 2012 - Springer
One concern in using cloud storage is that the sensitive data should be confidential to the
servers which are outside the trust domain of data owners. Another issue is that the user …

Proxy re-encryption with plaintext checkable encryption for integrating digital twins into IIoT

A Hadabi, Z Qu, R Elhabob, S Kumar, KH Yeh… - Computers and …, 2024 - Elsevier
Digital Twin (DT) technology has emerged as a robust mechanism for overseeing and
improving the lifecycle processes of the Industrial Internet of Things (IIoT) by creating their …