Attribute-based encryption for cloud computing access control: A survey

Y Zhang, RH Deng, S Xu, J Sun, Q Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Attribute-based encryption (ABE) for cloud computing access control is reviewed in this
article. A taxonomy and comprehensive assessment criteria of ABE are first proposed. In the …

Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating

Z Liu, ZL Jiang, X Wang, SM Yiu - Journal of Network and Computer …, 2018 - Elsevier
Abstract Attribute-Based Encryption (ABE) offers fine-grained access control policy over
encrypted data, and thus applicable in cloud storage to provide authorized data privacy …

Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation

K Sethi, A Pradhan, P Bera - Journal of Information Security and …, 2020 - Elsevier
Multi-authority ciphertext policy attribute-based encryption (CP-ABE) is one of the promising
approaches where multiple authorities issue and manage various attributes to achieve fine …

A review of big data security and privacy protection technology

D Lv, S Zhu, H Xu, R Liu - 2018 IEEE 18th International …, 2018 - ieeexplore.ieee.org
To study and solve the issues of big data security and privacy protection is the key to
promote the healthy development of big data. In this paper, a 3D big data security and …

Online/offline rewritable blockchain with auditable outsourced computation

L Guo, Q Wang, WC Yau - IEEE Transactions on Cloud …, 2021 - ieeexplore.ieee.org
Policy-based chameleon hash (PCH) is one of the techniques used for rewriting transaction-
level data stored in blockchains. This technique integrates the access policy of the attribute …

A keyword-searchable ABE scheme from lattice in cloud storage environment

L Liu, S Wang, B He, D Zhang - Ieee Access, 2019 - ieeexplore.ieee.org
Currently, the security situation of data security and user privacy protection is increasingly
serious in cloud environment. Ciphertext data storage can prevent the risk of user's privacy …

A secure multi‐authority attribute based encryption approach for robust smart grids

A Saidi, A Amira, O Nouali - Concurrency and Computation …, 2024 - Wiley Online Library
This paper presents EMBASS, an Enhanced Multi‐Authority Attribute‐Based Encryption
System for Smart Grids. EMBASS supports outsourced decryption to devices with limited …

Multi-authority ciphertext policy attribute-based encryption scheme on ideal lattices

Z Liu, ZL Jiang, X Wang, Y Wu… - 2018 IEEE Intl Conf on …, 2018 - ieeexplore.ieee.org
Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic
technology that provides fine-grained access control as well as data confidentiality. It …

Offline/Online Outsourced Attribute‐Based Encryption with Partial Policy Hidden for the Internet of Things

X Yan, G He, J Yu, Y Tang, M Zhao - Journal of Sensors, 2020 - Wiley Online Library
In the Internet of Things (IoT) environment, the intelligent devices collect and share large‐
scale sensitive personal data for a wide range of application. However, the power of storage …

Efficient, verifiable and privacy preserving decentralized attribute-based encryption for mobile cloud computing

M Lyu, X Li, H Li - … International Conference on Data Science in …, 2017 - ieeexplore.ieee.org
In order to realize data sharing in mobile cloud computing, decentralized attribute-based
encryption (ABE) has been widely concerned. However, the existing ABE schemes are full of …