4.6 Article

Multiauthority Attribute-Based Encryption for Assuring Data Deletion

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage

Ningyu Chen et al.

Summary: The study presents a ciphertext-policy ABE scheme with shared decryption, allowing authorized users to recover messages independently while semi-authorized users can work together to access the messages, improving decryption efficiency.

IEEE TRANSACTIONS ON COMPUTERS (2022)

Article Computer Science, Information Systems

Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities

Lei Zhang et al.

Summary: This paper provides a critique of cryptographic schemes designed for securing sensitive data in the cloud computing environment, as well as outlining research opportunities in the use of cryptographic techniques in cloud computing.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Hardware & Architecture

CEMAR: a fine grained access control with revocation mechanism for centralized multi-authority cloud storage

K. Dhal et al.

Summary: The article introduces a scheme named CEMAR to tackle data sharing security issues in cloud computing. The scheme improves communication efficiency while reducing computational burdens at the user end, and the security is verified using the Random-Oracle assumption.

JOURNAL OF SUPERCOMPUTING (2022)

Article Computer Science, Information Systems

Decentralized Attribute-Based Server-Aid Signature in the Internet of Things

Jiguo Li et al.

Summary: Devices of Internet of Things (IoT) generate a large amount of data, which poses secure authentication and access control challenges. Attribute-based signature (ABS) provides privacy-preserving access control and data authentication by signing a message over a set of attributes. Existing multiauthority ABS schemes face risks when the central authority is compromised and require expensive operations for resource-limited devices. To address these issues, a decentralized attribute-based server-aid signature (DABSAS) scheme is proposed, which offers anonymity, unforgeability, and alleviates the burden of signature and verification. The scheme is proven secure under the co-CDH assumption and demonstrates efficiency compared to existing schemes.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience

Qihong Yu et al.

Summary: The proposed scheme is a hierarchical identity-based online/offline encryption scheme that resists side channel attacks and is suitable for resource-constrained devices.

SECURITY AND COMMUNICATION NETWORKS (2022)

Article Computer Science, Information Systems

Efficient Attribute Based Server-Aided Verification Signature

Yu Chen et al.

Summary: The study introduced a novel Attribute Based Signature (ABS) scheme using attribute tree as access policy for flexible access control and employing server-aid technique to reduce computation burden of the verifier. This scheme is proven secure against chosen-policy selective-message attack in the standard model and is more efficient in private key generation and verification compared to existing schemes.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Information Systems

Key escrow-free attribute based encryption with user revocation

Ruyuan Zhang et al.

Summary: This article presents a key escrow-free CP-ABE scheme with user revocation, which can withstand collusion attacks between malicious users and revoked users. The scheme utilizes re-encryption technology to prevent revoked users from decrypting ciphertexts.

INFORMATION SCIENCES (2022)

Article Computer Science, Information Systems

Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT

Jiguo Li et al.

Summary: This article proposes a CP-ABE scheme for access control of IoT data on the cloud, providing fine-grained and flexible access control and addressing key abuse issues.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Article Computer Science, Information Systems

Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage

Jiguo Li et al.

Summary: To increase the availability and durability of outsourced data, many customers store multiple copies on multiple cloud servers. Existing PDP protocols mainly focus on single-copy storage and rely on PKI technique, which has security vulnerabilities and high communication/computational costs. In this paper, we propose a novel identity-based PDP scheme for multi-copy on multiple cloud storage servers, achieving both security and efficiency.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)

Article Computer Science, Information Systems

Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage

Jiguo Li et al.

Summary: Cloud storage service offers an efficient way for data sharing within a group, but ensuring data integrity requires RDPC protocols. Traditional PKI-based RDPC protocols have security flaws and certificate management burden, leading to the adoption of IBC for its basis, despite the key escrow issue. To address these challenges, a new RDPC protocol is proposed using certificateless signature technique to eliminate the need for certificates and key escrow problems.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Article Computer Science, Information Systems

Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage

Jiguo Li et al.

Summary: This article proposes a new Identity-based RDIC scheme that utilizes a homomorphic verifiable tag to reduce system complexity, while also masking original data with random integer addition to protect data privacy. The scheme is proven to be secure under the assumption of computational Diffie-Hellman problem and is shown to be efficient and feasible for real-life applications through experiment results.

IEEE SYSTEMS JOURNAL (2021)

Article Computer Science, Hardware & Architecture

Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting

Yinbin Miao et al.

Summary: CP-ABKS system enables search queries and fine-grained access control over encrypted data in the cloud, but lacks effective support for shared multi-owner settings and privacy protection. The proposed ABKS-SM systems emphasize privacy preservation and malicious user tracing, with features of selective security and resistance to offline keyword-guessing attacks.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Automation & Control Systems

Pairing-Free Certificate-Based Searchable Encryption Supporting Privacy-Preserving Keyword Search Function for IIoTs

Yang Lu et al.

Summary: Industrial IoT (IIoT) is an practical application of the Internet of Things (IoT) in modern industry that accelerates industrial development. The recent certificate-based encryption with keyword search (CBEKS) scheme aims to address data privacy protection in the cloud, showing advantages in computation performance and security against keyword guessing attacks.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2021)

Article Computer Science, Information Systems

O3-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System

Rui Guo et al.

Summary: This article presents an efficient outsourced online/offline revocable ciphertext policy attribute-based encryption scheme in the IoMT ecosystem using cloud servers and blockchains. The scheme achieves characteristics of fine-grained access control, fast encryption, outsourced decryption, user revocation, and ciphertext verification. It also utilizes a chameleon hash function to construct private keys with collision resistance, semantic security, and key-exposure free for revocation purposes.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Hardware & Architecture

Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data

Yinbin Miao et al.

Summary: This paper introduces a secure Multi-authority CP-ABKS (MABKS) system to address limitations in existing CP-ABKS schemes and minimize the computation and storage burden on resource-limited devices in cloud systems. The MABKS system is selectively secure in both selective-matrix and selective-attribute models, demonstrating efficiency and utility in practical applications.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Information Systems

Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing

Jiguo Li et al.

Summary: In this paper, an efficient extended file hierarchy CP-ABE scheme (EFH-CP-ABE) is proposed to encrypt multiple files on the same access level for secure cloud storage. This scheme is practical and beneficial for big institutions or companies that have many hierarchical sectors.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2021)

Article Computer Science, Information Systems

Efficient and Fine-Grained Signature for IIoT With Resistance to Key Exposure

Yangyang Bao et al.

Summary: This article presents an intrusion-resilient server-aided ABS scheme that periodically updates the signing key with the assistance of a helper device, reducing computational overheads for resource-constrained devices and providing a rigorous security proof. Comparisons and experiments demonstrate the efficiency and practicality of this scheme for the IIoT scenario.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Information Systems

Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing

Yinbin Miao et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)

Article Computer Science, Information Systems

Full Verifiability for Outsourced Decryption in Attribute Based Encryption

Jiguo Li et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2020)

Article Computer Science, Information Systems

Privacy-Preserving and Pairing-Free Multirecipient Certificateless Encryption With Keyword Search for Cloud-Assisted IIoT

Lu Yang et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

Remote Data Checking With a Designated Verifier in Cloud Storage

Hao Yan et al.

IEEE SYSTEMS JOURNAL (2020)

Proceedings Paper Computer Science, Cybernetics

ACS-FIT: A Secure and Efficient Access Control Scheme for Fog-enabled IoT

Richa Sarma et al.

2020 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC) (2020)

Proceedings Paper Computer Science, Information Systems

Key-Escrow Free Attribute-Based Multi-Keyword Search with Dynamic Policy Update in Cloud Computing

Uma Sankararao Varri et al.

2020 20TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2020) (2020)

Article Computer Science, Hardware & Architecture

Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems

Yannan Li et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Information Systems

Efficient attribute-based encryption with attribute revocation for assured data deletion

Liang Xue et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Information Systems

Hierarchical attribute based encryption with continuous leakage-resilience

Jiguo Li et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Information Systems

Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service

Gang Yu et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2019)

Article Computer Science, Information Systems

Key-policy attribute-based encryption against continual auxiliary input leakage

Jiguo Li et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Theory & Methods

An efficient access control scheme with outsourcing capability and attribute update for fog computing

Peng Zhang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage

Jiguo Li et al.

IEEE SYSTEMS JOURNAL (2018)

Article Automation & Control Systems

Assured Data Deletion With Fine-Grained Access Control for Fog-Based Industrial Applications

Yong Yu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Theory & Methods

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage

Hao Yan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Theory & Methods

RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage

Kaiping Xue et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing

Jiguo Li et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)

Article Computer Science, Information Systems

KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage

Jiguo Li et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)

Article Engineering, Electrical & Electronic

Ciphertext-Policy Attribute Based Encryption Supporting Any Monotone Access Structures Without Escrow

Zhao Qianqian et al.

CHINESE JOURNAL OF ELECTRONICS (2017)

Article Computer Science, Hardware & Architecture

User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption

Yogachandran Rahulamathavan et al.

IEEE TRANSACTIONS ON COMPUTERS (2016)

Article Computer Science, Theory & Methods

Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption

Jinguang Han et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Article Computer Science, Information Systems

Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation

Huiling Qian et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2015)

Article Mathematics, Applied

Removing escrow from ciphertext policy attribute-based encryption

Junbeom Hur et al.

COMPUTERS & MATHEMATICS WITH APPLICATIONS (2013)

Article Computer Science, Theory & Methods

HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing

Zhiguo Wan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2012)

Article Computer Science, Theory & Methods

Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption

Jinguang Han et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)

Proceedings Paper Computer Science, Information Systems

Ciphertext-policy attribute-based encryption

John Bethencourt et al.

2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS (2007)