An enhanced approach for CP-ABE with proxy re-encryption in IoT paradigm

N Doshi - Jordanian Journal of Computers and Information …, 2022 - search.proquest.com
Abstract In Internet of Things (IoT), encryption is a technique in which plaintext is converted
to ciphertext into make it non-recovered by the attacker without secret key. Ciphertext policy …

A Stronger Secure Ciphertext Fingerprint-Based Commitment Scheme for Robuster Verifiable OD-CP-ABE in IMCC

Z Zhang, W Huang, L Yang, Y Liao… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Outsourced decryption attribute-based encryption (OD-ABE) is emerging as a promising
cryptographic tool to provide efficient fine-grained access control for data accessing and …

Secure Multi‐Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks

Y Ding, H Xu, Y Wang, F Yuan… - Security and …, 2021 - Wiley Online Library
Wireless body area network (WBAN) consists of a number of sensors that are worn on
patients to collect dynamic e‐health records (EHRs) and mobile devices that aggregate …

Revocable and Efficient Blockchain-based Fine-grained Access Control against EDoS Attacks in Cloud Storage

Q Zhang, C Xu, H Zhong, C Gu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Users have become accustomed to storing data on the cloud using ciphertext policy attribute-
based encryption (CP-ABE) for fine-grained access control. However, this encryption …

A New Efficient and Privacy-Preserving Hybrid Classification model for Patient-Centric Clinical Decision Support System

SP Rathinaeaswari, V Santhi - Journal of Advanced Research …, 2023 - semarakilmu.com.my
A lot of focus has recently been placed on clinical decision support systems, that use
advanced data mining methods to assist clinicians in making wise decisions. Along with …

A novel traceability approach in IoT paradigm for CP-ABE proxy re-encryption

N Doshi - Sādhanā, 2022 - Springer
Abstract Internet of Things (IoT) is a technology aimed to provide the cost effective
infrastructure for today's problems. Due to its plus points, it is widely deployed for various …

An efficient reusable attribute-based signature scheme for mobile services with multi access policies in fog computing

Z Zhang, W Huang, S Cai, L Yang, Y Liao… - Computer …, 2022 - Elsevier
Fog computing is an emergent computing paradigm that supports the mobility and
geographic distribution of Internet of Things (IoT) nodes and delivers context-aware …

[HTML][HTML] An improved approach in CP-ABE with proxy re-encryption

N Doshi, R Patel - e-Prime-Advances in Electrical Engineering …, 2022 - Elsevier
A cryptographic encryption technique converts plaintext into ciphertext, which is non-
recoverable by a malicious user without knowing the secret key. The Ciphertext Policy …

Outsourcing decryption algorithm of Verifiable transformed ciphertext for data sharing.

G Xu, C Wang, S Li, X Shi, X Luo… - KSII Transactions on …, 2024 - search.ebscohost.com
Mobile cloud computing is a very attractive service paradigm that outsources users' data
computing and storage from mobile devices to cloud data centers. To protect data privacy …

An Improved Approach in Cloud-Assisted IoT Infrastructure with Anonymous Key Issuing

N Doshi, C Patel - Novel Developments in Futuristic AI-based …, 2023 - Springer
Lightweight cryptography is a technique in which a scheme is proposed to have a minimum
computation overhead on the end users. Indeed, this is a required solution for the many real …