An efficient attribute-based encryption scheme with policy update and file update in cloud computing

J Li, S Wang, Y Li, H Wang, H Wang… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Recently, more and more users and enterprises have entrusted data storage and platform
construction to proxy cloud service provider (PCSP) through cloud technology. Under this …

Medical data sharing scheme based on attribute cryptosystem and blockchain technology

X Yang, T Li, X Pei, L Wen, C Wang - IEEE Access, 2020 - ieeexplore.ieee.org
Electronic medical data have significant advantages over paper-based patient records when
it comes to storage and retrieval. However, most existing medical data sharing schemes …

A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing

H Wang, Y Li, W Susilo, DH Duong, F Luo - Computer Standards & …, 2022 - Elsevier
How to use efficient search mechanisms to realize data sharing while ensuring data security
has become an important research topic at present. In this paper, we propose a new …

Achieving fuzzy matching data sharing for secure cloud-edge communication

C Zhang, M Zhao, Y Xu, T Wu, Y Li, L Zhu… - China …, 2022 - ieeexplore.ieee.org
In this paper, we propose a novel fuzzy matching data sharing scheme named FADS for
cloud-edge communications. FADS allows users to specify their access policies, and …

Secret-sharing schemes for general and uniform access structures

B Applebaum, A Beimel, O Farràs, O Nir… - … Conference on the Theory …, 2019 - Springer
A secret-sharing scheme allows some authorized sets of parties to reconstruct a secret; the
collection of authorized sets is called the access structure. For over 30 years, it was known …

A review on data privacy using attribute-based encryption

D Deepika, R Malik, S Kumar, R Gupta… - Proceedings of the …, 2020 - papers.ssrn.com
Cloud computing grants us the facility of storing the data and accessing it remotely over the
internet. Data storage on the cloud does not guarantee the security of data. If the cloud …

Better secret sharing via robust conditional disclosure of secrets

B Applebaum, A Beimel, O Nir, N Peter - Proceedings of the 52nd Annual …, 2020 - dl.acm.org
A secret-sharing scheme allows to distribute a secret s among n parties such that only some
predefined “authorized” sets of parties can reconstruct the secret, and all other …

Upslices, Downslices, and Secret-Sharing with Complexity of

B Applebaum, O Nir - Advances in Cryptology–CRYPTO 2021: 41st …, 2021 - Springer
A secret-sharing scheme allows to distribute a secret s among n parties such that only some
predefined “authorized” sets of parties can reconstruct the secret, and all other …

On the Power of Amortization in Secret Sharing: d-Uniform Secret Sharing and CDS with Constant Information Rate

B Applebaum, B Arkis - ACM Transactions on Computation Theory …, 2020 - dl.acm.org
Consider the following secret-sharing problem: A file s should be distributed between n
servers such that (d-1)-subsets cannot recover the file,(d+ 1)-subsets can recover the file …

The complexity of multiparty PSM protocols and related models

A Beimel, E Kushilevitz, P Nissim - … on the Theory and Applications of …, 2018 - Springer
We study the efficiency of computing arbitrary k-argument functions in the Private
Simultaneous Messages (PSM) model of 10, 14. This question was recently studied by …