Efficient revocable attribute-based encryption with verifiable data integrity

S Chen, J Li, Y Zhang, J Han - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Nowadays, cloud computing and cloud storage services that can reduce the local workload
are becoming increasingly popular, allowing individual and corporate users to upload data …

[HTML][HTML] Attribute-based encryption in securing big data from post-quantum perspective: a survey

ZB Jemihin, SF Tan, GC Chung - Cryptography, 2022 - mdpi.com
Attribute-based encryption (ABE) cryptography is widely known for its potential to solve the
scalability issue of recent public key infrastructure (PKI). It provides a fine-grained access …

Attribute-based conditional proxy re-encryption in the standard model under LWE

X Liang, J Weng, A Yang, L Yao, Z Jiang… - … Security–ESORICS 2021 …, 2021 - Springer
Attribute-based conditional proxy re-encryption (AB-CPRE) allows delegators to carry out
attribute-based control on the delegation of decryption by setting policies and attribute …

Generalized autonomous path proxy re-encryption scheme to support branch functionality

Z Lin, J Zhou, Z Cao, X Dong… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Proxy Re-Encryption (PRE), a special cryptographic primitive, can efficiently perform
ciphertext conversion on the cloud. To enable the data owner (ie delegator) to authorize a …

Key-Policy Attribute-Based Encryption With Switchable Attributes for Fine-Grained Access Control of Encrypted Data

F Luo, H Wang, X Yan, J Wu - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Fine-grained access control systems facilitate granting differential access rights to a set of
users and allow flexibility in specifying the access rights of individual users. As an important …

A blockchain-based efficient and verifiable attribute-based proxy re-encryption cloud sharing scheme

T Feng, D Wang, R Gong - Information, 2023 - mdpi.com
When choosing a third-party cloud storage platform, the confidentiality of data should be the
primary concern. To address the issue of one-to-many access control during data sharing, it …

Attribute-based verifiable conditional proxy re-encryption scheme

Y Tang, M **, H Meng, L Yang, C Zheng - Entropy, 2023 - mdpi.com
There are mostly semi-honest agents in cloud computing, so agents may perform unreliable
calculations during the actual execution process. In this paper, an attribute-based verifiable …

Lattice-based autonomous path proxy re-encryption in the standard model

W **e, J Weng, Y Tong, X Liang, L Yao… - Science China Information …, 2023 - Springer
Autonomous path proxy re-encryption (AP-PRE) is a type of PRE that implements control on
the delegation path in a multi-hop PRE. AP-PRE forces the proxy to perform the …

A ring learning with errors-based ciphertext-policy attribute-based proxy re-encryption scheme for secure big data sharing in cloud environment

J Li, J Peng, Z Qiao - Big Data, 2024 - liebertpub.com
Owing to the huge volume of big data, users generally use the cloud to store big data.
However, because the data are out of the control of users, sensitive data need to be …

A semantic model based on ensemble learning and attribute-based encryption to increase security of smart buildings in fog computing

R Rezapour, P Asghari, H Haj Seyyed Javadi… - The Journal of …, 2024 - Springer
Fog computing is a revolutionary technology that, by expanding the cloud computing
paradigm to the network edge, brings a significant achievement in the resource-constrained …