نتایج جستجو برای: modiriat abe shahri

تعداد نتایج: 1929  

2014
Liaojun Pang Jie Yang Zhengtao Jiang

With the development of cryptography, the attribute-based encryption (ABE) draws widespread attention of the researchers in recent years. The ABE scheme, which belongs to the public key encryption mechanism, takes attributes as public key and associates them with the ciphertext or the user's secret key. It is an efficient way to solve open problems in access control scenarios, for example, how ...

Journal: :IACR Cryptology ePrint Archive 2009
Jin Li Kui Ren Kwangjo Kim

As a recently proposed public key primitive, attribute-based encryption (ABE) (including Ciphertext-policy ABE (CP-ABE) and Key-policy ABE (KP-ABE)) is a highly promising tool for secure fine-grained access control. For the purpose of secure access control, there is, however, still one critical functionality missing in the existing ABE schemes, which is the prevention of key abuse. In particula...

2016
V. KALYANI

Cloud computing is a revolutionary computing environment, which allows user a flexible, on-demand, and low-cost usage of computing resources, but as the data is outsourced to some cloud servers, and various privacy issues emerge from it. To handle these security problems, various schemes based on the Attribute-Based Encryption have been proposed recently. Attribute-based Encryption (ABE) is a c...

2017
D. HARICHARAN REDDY

Cloud computing is a revolutionary computing environment, which allows user a flexible, on-demand, and low-cost usage of computing resources, but as the data is outsourced to some cloud servers, and various privacy issues emerge from it. To handle these security problems, various schemes based on the Attribute-Based Encryption have been proposed recently. Attribute-based Encryption (ABE) is a c...

2017
Gene Itkis Emily Shen Mayank Varia David Wilson Arkady Yerukhimovich

Attribute-based encryption (ABE) enables encryption of messages under access policies so that only users with attributes satisfying the policy can decrypt the ciphertext. In standard ABE, an arbitrary number of colluding users, each without an authorized attribute set, cannot decrypt the ciphertext. However, all existing ABE schemes rely on concrete cryptographic assumptions such as the hardnes...

Journal: :J. Inf. Sci. Eng. 2015
Sadikin Rifki Youngho Park Sangjae Moon

A new fully secure ciphertext-policy attributed based encryption (CP-ABE) scheme with high expressibity access policy is presented. Our CP-ABE scheme uses tree-based access structure which includes AND, OR, threshold and NOT gates which granted high degree of expressibility for encryptor to make an access policy. Moreover, our scheme achieves full security CP-ABE definition where any access str...

Journal: :Inf. Process. Lett. 2011
Rena Bakhshi Jörg Endrullis Wan Fokkink Jun Pang

We propose a probabilistic network model, called asynchronous bounded expected delay (ABE), which requires a known bound on the expected message delay. In ABE networks all asynchronous executions are possible, but executions with extremely long delays are less probable. Thus, the ABE model captures asynchrony that occurs in sensor networks and ad-hoc networks. At the example of an election algo...

Journal: :IJACT 2009
Keita Emura Atsuko Miyaji Akito Nomura Kazumasa Omote Masakazu Soshi

An Attribute-Based Encryption (ABE) is an encryption scheme, where users with some attributes can decrypt ciphertexts associated with these attributes. The length of the ciphertext depends on the number of attributes in previous ABE schemes. In this paper, we propose a new Ciphertext-Policy Attribute-Based Encryption (CP-ABE) with constant ciphertext length. In our scheme, the number of pairing...

2015
Haibo Huang Vijay Singh Nasib Qureshi

BACKGROUND Waste is currently a major problem in the world, both in the developing and the developed countries. Efficient utilization of food waste for fuel and chemical production can positively influence both the energy and environmental sustainability. This study investigated using food waste to produce acetone, butanol, and ethanol (ABE) by Clostridium beijerinckii P260. RESULTS In contro...

2017
V. Agalya

Attribute-based encryption (ABE) with outsourced decryption not only enables finegrained sharing of encrypted data, but also overcomes the effective drawback of the standard ABE schemes. An Attribute based encryption scheme with outsourced decryption allows a third party (e.g., a cloud server) to renovate an ABE cipher text into a (short) El Gamal-type cipher text using a public transformation ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید