Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Efficient revocable attribute-based encryption with verifiable data integrity
S Chen, J Li, Y Zhang, J Han - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Nowadays, cloud computing and cloud storage services that can reduce the local workload
are becoming increasingly popular, allowing individual and corporate users to upload data …
are becoming increasingly popular, allowing individual and corporate users to upload data …
[HTML][HTML] Attribute-based encryption in securing big data from post-quantum perspective: a survey
Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the
scalability issue of recent public key infrastructure (PKI). It provides a fine-grained access …
scalability issue of recent public key infrastructure (PKI). It provides a fine-grained access …
Attribute-based conditional proxy re-encryption in the standard model under LWE
Attribute-based conditional proxy re-encryption (AB-CPRE) allows delegators to carry out
attribute-based control on the delegation of decryption by setting policies and attribute …
attribute-based control on the delegation of decryption by setting policies and attribute …
Generalized autonomous path proxy re-encryption scheme to support branch functionality
Z Lin, J Zhou, Z Cao, X Dong… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Proxy Re-Encryption (PRE), a special cryptographic primitive, can efficiently perform
ciphertext conversion on the cloud. To enable the data owner (ie delegator) to authorize a …
ciphertext conversion on the cloud. To enable the data owner (ie delegator) to authorize a …
Key-Policy Attribute-Based Encryption With Switchable Attributes for Fine-Grained Access Control of Encrypted Data
Fine-grained access control systems facilitate granting differential access rights to a set of
users and allow flexibility in specifying the access rights of individual users. As an important …
users and allow flexibility in specifying the access rights of individual users. As an important …
A blockchain-based efficient and verifiable attribute-based proxy re-encryption cloud sharing scheme
T Feng, D Wang, R Gong - Information, 2023 - mdpi.com
When choosing a third-party cloud storage platform, the confidentiality of data should be the
primary concern. To address the issue of one-to-many access control during data sharing, it …
primary concern. To address the issue of one-to-many access control during data sharing, it …
Attribute-based verifiable conditional proxy re-encryption scheme
Y Tang, M **, H Meng, L Yang, C Zheng - Entropy, 2023 - mdpi.com
There are mostly semi-honest agents in cloud computing, so agents may perform unreliable
calculations during the actual execution process. In this paper, an attribute-based verifiable …
calculations during the actual execution process. In this paper, an attribute-based verifiable …
Lattice-based autonomous path proxy re-encryption in the standard model
W **e, J Weng, Y Tong, X Liang, L Yao… - Science China Information …, 2023 - Springer
Autonomous path proxy re-encryption (AP-PRE) is a type of PRE that implements control on
the delegation path in a multi-hop PRE. AP-PRE forces the proxy to perform the …
the delegation path in a multi-hop PRE. AP-PRE forces the proxy to perform the …
A ring learning with errors-based ciphertext-policy attribute-based proxy re-encryption scheme for secure big data sharing in cloud environment
J Li, J Peng, Z Qiao - Big Data, 2024 - liebertpub.com
Owing to the huge volume of big data, users generally use the cloud to store big data.
However, because the data are out of the control of users, sensitive data need to be …
However, because the data are out of the control of users, sensitive data need to be …
A semantic model based on ensemble learning and attribute-based encryption to increase security of smart buildings in fog computing
Fog computing is a revolutionary technology that, by expanding the cloud computing
paradigm to the network edge, brings a significant achievement in the resource-constrained …
paradigm to the network edge, brings a significant achievement in the resource-constrained …