Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Key escrow-free attribute based encryption with user revocation
There exists a key escrow issue in ciphertext-policy attribute-based encryption (CP-ABE).
The key generator center issues all users' secret keys and can decrypt each ciphertext by …
The key generator center issues all users' secret keys and can decrypt each ciphertext by …
Improving privacy and security in multi-authority attribute-based encryption
Attribute based encryption (ABE)[13] determines decryption ability based on a user's
attributes. In a multi-authority ABE scheme, multiple attribute-authorities monitor different …
attributes. In a multi-authority ABE scheme, multiple attribute-authorities monitor different …
Improving security and efficiency in attribute-based data sharing
J Hur - IEEE transactions on knowledge and data engineering, 2011 - ieeexplore.ieee.org
With the recent adoption and diffusion of the data sharing paradigm in distributed systems
such as online social networks or cloud computing, there have been increasing demands …
such as online social networks or cloud computing, there have been increasing demands …
Attribute-based data sharing scheme revisited in cloud computing
Ciphertext-policy attribute-based encryption (CP-ABE) is a very promising encryption
technique for secure data sharing in the context of cloud computing. Data owner is allowed …
technique for secure data sharing in the context of cloud computing. Data owner is allowed …
Efficient registration-based encryption
Registration-based encryption (RBE) was recently introduced as an alternative to identity-
based encryption (IBE), to resolve the key-escrow problem: In RBE, the trusted authority is …
based encryption (IBE), to resolve the key-escrow problem: In RBE, the trusted authority is …
A survey on attribute-based signatures
Abstract Attribute-Based Signature (ABS), where messages are signed concerning a signing
strategy conveyed as predicates, provides a necessary platform for implementing fine …
strategy conveyed as predicates, provides a necessary platform for implementing fine …
Registration-based encryption: removing private-key generator from IBE
In this work, we introduce the notion of registration-based encryption (RBE for short) with the
goal of removing the trust parties need to place in the private-key generator in an IBE …
goal of removing the trust parties need to place in the private-key generator in an IBE …
Match me if you can: Matchmaking encryption and its applications
We introduce a new form of encryption that we name matchmaking encryption (ME). Using
ME, sender S and receiver R (each with its own attributes) can both specify policies the other …
ME, sender S and receiver R (each with its own attributes) can both specify policies the other …
Dynamic secure cloud storage with provenance
One concern in using cloud storage is that the sensitive data should be confidential to the
servers which are outside the trust domain of data owners. Another issue is that the user …
servers which are outside the trust domain of data owners. Another issue is that the user …
Proxy re-encryption with plaintext checkable encryption for integrating digital twins into IIoT
Digital Twin (DT) technology has emerged as a robust mechanism for overseeing and
improving the lifecycle processes of the Industrial Internet of Things (IIoT) by creating their …
improving the lifecycle processes of the Industrial Internet of Things (IIoT) by creating their …