Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
We propose a technique of individually modifying an attribute-based encryption scheme (ABE) secure against chosen-plaintext attacks (CPA) into an ABE scheme ...
People also ask
In this paper, we work through a problem of constructing a shorter ABE scheme that attains indistinguishability against chosen-ciphertext attacks (IND-CCA) in ...
We propose a technique of individually converting an attribute-based encryption scheme (ABE) which is secure against chosen-plaintext attacks into an ABE scheme ...
Jan 31, 2018 · We show direct chosen-ciphertext security modifi- cation in the case of attribute-based encryption (ABE), where an ABE scheme secure against ...
In this paper we present a system for realizing complex access control on encrypted data that we call Ciphertext-Policy Attribute-Based Encryption. By using ...
Missing: Short | Show results with:Short
We show direct chosen-ciphertext security modification in the case of attribute-based encryption (ABE), where an ABE scheme secure against chosen-plaintext ...
Mar 15, 2017 · We propose two Key-Policy Attribute-Based Encryption (KP-ABE) schemes for Linear Secret-Sharing Scheme (LSSS)-realizable Monotone Access Structure (MAS).
This chapter presents a secure and an efficient symmetric key technique that harnesses the readily available social profiling information of the sender for ...
Ciphertext policy attribute based encryption (CPABE) allows a sender to distribute messages based on an access policy which can be expressed as a boolean ...
We hereby introduce a new technique, which hides the access policy using a hashing algorithm and provides security against insider attack using a signature ...