Journal articles on the topic 'Ciphertext policy attribute-based encryption (CP-ABE)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Ciphertext policy attribute-based encryption (CP-ABE).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Tseng, Yi-Fan, Chun-I. Fan, and Chih-Wen Lin. "Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption." JUCS - Journal of Universal Computer Science 25, no. (3) (2019): 182–202. https://doi.org/10.3217/jucs-025-03-0182.
Full textMa, Chao, Haiying Gao, and Duo Wei. "A CP-ABE Scheme Supporting Arithmetic Span Programs." Security and Communication Networks 2020 (March 16, 2020): 1–16. http://dx.doi.org/10.1155/2020/3265871.
Full textLiu, Zhe, Fuqun Wang, Kefei Chen, and Fei Tang. "A New User Revocable Ciphertext-Policy Attribute-Based Encryption with Ciphertext Update." Security and Communication Networks 2020 (December 22, 2020): 1–11. http://dx.doi.org/10.1155/2020/8856592.
Full textMohan, Dr K. Madan. "Securing Cloud Data with Blockchain Based Approach." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem51093.
Full textMuhammad, Norhidayah, Jasni Mohamad Zain, and Mumtazimah Mohamad. "Current Issues in Ciphertext Policy-Attribute Based Scheme for Cloud Computing: A Survey." International Journal of Engineering & Technology 7, no. 2.15 (2018): 64. http://dx.doi.org/10.14419/ijet.v7i2.15.11215.
Full textYang, Feng, Limin Liu, Weijing You, and Jiwu Jing. "You Are Revoked and Out: Towards Directly Revocable Ciphertext-Policy Attribute-Based Encryption." Security and Communication Networks 2022 (September 23, 2022): 1–17. http://dx.doi.org/10.1155/2022/6074322.
Full textXie, Xingxing, Hua Ma, Jin Li, and Xiaofeng Chen. "An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing." JUCS - Journal of Universal Computer Science 19, no. (16) (2013): 2349–67. https://doi.org/10.3217/jucs-019-16-2349.
Full textZhang, Shao Min, Jun Ran, and Bao Yi Wang. "Research on Access Control Based on CP-ABE Algorithm and Cloud Computing." Applied Mechanics and Materials 513-517 (February 2014): 2273–76. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.2273.
Full textEl Gafif, Hassan, and Ahmed Toumanari. "Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption." Security and Communication Networks 2021 (May 18, 2021): 1–17. http://dx.doi.org/10.1155/2021/8834616.
Full textAl-Dahhan, Shi, Lee, and Kifayat. "Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption." Sensors 19, no. 7 (2019): 1695. http://dx.doi.org/10.3390/s19071695.
Full textLu, Song Feng, Yu Zhang, Jie Sun, and Liping Yang. "Fully Secure Ciphertext-Policy Attribute-Based Encryption in Prime Order Group." Applied Mechanics and Materials 263-266 (December 2012): 2920–23. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2920.
Full textGuan, Zhitao, Jing Li, Zijian Zhang, and Liehuang Zhu. "Conditional Ciphertext-Policy Attribute-Based Encryption Scheme in Vehicular Cloud Computing." Mobile Information Systems 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/1493290.
Full textKumar, G. Sravan, and A. Sri Krishna. "Data Security for Cloud Datasets With Bloom Filters on Ciphertext Policy Attribute Based Encryption." International Journal of Information Security and Privacy 13, no. 4 (2019): 12–27. http://dx.doi.org/10.4018/ijisp.2019100102.
Full textYang, Kunwei, Bo Yang, Yanwei Zhou, Tao Wang, and Linming Gong. "Privacy Protection of Task in Crowdsourcing: Policy-Hiding and Attribute Updating Attribute-Based Access Control Based on Blockchain." Wireless Communications and Mobile Computing 2022 (March 24, 2022): 1–12. http://dx.doi.org/10.1155/2022/7787866.
Full textChen, Xiaoxuan, Yineng Chen, Xiayu Wang, Xinghui Zhu, and Kui Fang. "DSVN: A Flexible and Secure Data-Sharing Model for VANET Based on Blockchain." Applied Sciences 13, no. 1 (2022): 217. http://dx.doi.org/10.3390/app13010217.
Full textKumar, G. Sravan, and A. Sri Krishna. "Traitor Traceable and Revocation-oriented Attribute Based Encryption with Proxy Decryption for Cloud Devices." International Journal of Computer Network and Information Security 16, no. 3 (2024): 37–51. http://dx.doi.org/10.5815/ijcnis.2024.03.04.
Full textSadikin, Rifki, SangJae Moon, and YoungHo Park. "Ciphertext Policy-Attribute Based Encryption with Non Monotonic Access Structures." Journal of the Institute of Electronics and Information Engineers 50, no. 9 (2013): 21–31. http://dx.doi.org/10.5573/ieek.2013.50.9.021.
Full textPang, Liaojun, Jie Yang, and Zhengtao Jiang. "A Survey of Research Progress and Development Tendency of Attribute-Based Encryption." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/193426.
Full textWu, Yi, Wei Zhang, Hu Xiong, Zhiguang Qin, and Kuo-Hui Yeh. "Efficient access control with traceability and user revocation in IoT." Multimedia Tools and Applications 80, no. 20 (2021): 31487–508. http://dx.doi.org/10.1007/s11042-021-11286-0.
Full textDong, Zhenjiang, Hanshu Hong, Zhixin Sun, and Wei Wang. "A Key Insulated Ciphertext Policy Attribute Based Sign Cryption for Mobile Networks." Journal of Computational and Theoretical Nanoscience 13, no. 10 (2016): 7226–33. http://dx.doi.org/10.1166/jctn.2016.5695.
Full textMa, Haiying, Zhanjun Wang, and Zhijin Guan. "Efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption with User Revocation." Security and Communication Networks 2019 (February 14, 2019): 1–11. http://dx.doi.org/10.1155/2019/8093578.
Full textNaregal, Keerti, and Vijay Kalman. "CP-ABE Unveiled: A Path to Fine-Tuned Cloud Data Security." Journal of Cyber Security, Privacy Issues and Challenges 2, no. 2 (2023): 20–25. http://dx.doi.org/10.46610/jcspic.2023.v02i02.004.
Full textChen, Yang, Wenmin Li, Fei Gao, et al. "Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures." Computer Journal 62, no. 12 (2019): 1748–60. http://dx.doi.org/10.1093/comjnl/bxz052.
Full textLian, Huijie, Qingxian Wang, and Guangbo Wang. "Large Universe Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage." International Arab Journal of Information Technology 17, no. 1 (2019): 107–17. http://dx.doi.org/10.34028/iajit/17/1/13.
Full textMohd Satar, Siti Dhalila, Masnida Hussin, Zurina Mohd Hanapi, and Mohamad Afendee Mohamed. "Towards Virtuous Cloud Data Storage Using Access Policy Hiding in Ciphertext Policy Attribute-Based Encryption." Future Internet 13, no. 11 (2021): 279. http://dx.doi.org/10.3390/fi13110279.
Full textLiu, Joseph K., Xiaoling Tao, Wei Wu, and Yang Li. "GO-CP-ABE: group-oriented ciphertext-policy attribute-based encryption." International Journal of Embedded Systems 10, no. 1 (2018): 62. http://dx.doi.org/10.1504/ijes.2018.10010502.
Full textLi, Yang, Xiaoling Tao, Wei Wu, and Joseph K. Liu. "GO-CP-ABE: group-oriented ciphertext-policy attribute-based encryption." International Journal of Embedded Systems 10, no. 1 (2018): 62. http://dx.doi.org/10.1504/ijes.2018.089434.
Full textLi, Yuancheng, Pan Zhang, and Boyan Wang. "An Improved Ciphertext-Policy Attribute-Based Encryption Scheme in Power Cloud Access Control." Applied Sciences 8, no. 10 (2018): 1836. http://dx.doi.org/10.3390/app8101836.
Full textHu, Ronglei, Ziwei Ma, Li Li, et al. "An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption." Sensors 23, no. 19 (2023): 8038. http://dx.doi.org/10.3390/s23198038.
Full textSmitha, K*1 &. Mrs. Amaya Anna Joy2. "A SURVEY ON ATTRIBUTE-BASED ACCESS CONTROL MECHANISMS IN CLOUD ENVIRONMENT." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Metanoia 19 (April 5, 2019): 76–80. https://doi.org/10.5281/zenodo.2630856.
Full textSampath, Kumar Tatipally, and K. Shahu Chatrapathi Dr. "Efficient Access Control and Security for Multi Authority Cloud Storage Server." International Journal of Trend in Scientific Research and Development 1, no. 6 (2017): 804–7. https://doi.org/10.31142/ijtsrd4599.
Full textChinnasamy, P., P. Deepalakshmi, Ashit Kumar Dutta, Jinsang You, and Gyanendra Prasad Joshi. "Ciphertext-Policy Attribute-Based Encryption for Cloud Storage: Toward Data Privacy and Authentication in AI-Enabled IoT System." Mathematics 10, no. 1 (2021): 68. http://dx.doi.org/10.3390/math10010068.
Full textZhang, Kai, Yanping Li, Yun Song, Laifeng Lu, Tao Zhang, and Qi Jiang. "A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access." Security and Communication Networks 2020 (December 22, 2020): 1–14. http://dx.doi.org/10.1155/2020/6661243.
Full textDwivedi, Rajendra Kumar, Rakesh Kumar, and Rajkumar Buyya. "Secure Healthcare Monitoring Sensor Cloud With Attribute-Based Elliptical Curve Cryptography." International Journal of Cloud Applications and Computing 11, no. 3 (2021): 1–18. http://dx.doi.org/10.4018/ijcac.2021070101.
Full textZhang, Zhishuo, Wei Zhang, and Zhiguang Qin. "Fully Constant-Size CP-ABE with Privacy-Preserving Outsourced Decryption for Lightweight Devices in Cloud-Assisted IoT." Security and Communication Networks 2021 (May 5, 2021): 1–16. http://dx.doi.org/10.1155/2021/6676862.
Full textPongpisit, Wuttidittachotti, and Natho Parinya. "Improved ciphertext-policy time using short elliptic curve Diffie–Hellman." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4547–56. https://doi.org/10.11591/ijece.v13i4.pp4547-4556.
Full textRaju, K. Ravi. "SECURE AND EXPRESSIVE DATA ACCESS CONTROL FOR CLOUD STORAGE, BY USING CRYPTCLOUD+." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32362.
Full textWang, Changji, and Jianfa Luo. "An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length." Mathematical Problems in Engineering 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/810969.
Full textKiran Kumar, G., E. Amarnath Reddy, B. Mamatha, and Kompally Manisha. "Access Policy’s Over Encrypted Cloud Storage for Secure Deduplication." International Journal of Engineering & Technology 7, no. 3.27 (2018): 27. http://dx.doi.org/10.14419/ijet.v7i3.27.17648.
Full textLi, Qi, Hongbo Zhu, Zuobin Ying, and Tao Zhang. "Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud." Wireless Communications and Mobile Computing 2018 (June 6, 2018): 1–12. http://dx.doi.org/10.1155/2018/1701675.
Full textBandu, Mr Madar, L. Sai Kethana, M. Uday Sai Kiran, N. Meghan Satwik, and P. Keerthipriya. "Multi-Authority Attribute Based Keyword Search Over Encrypted Cloud Data." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 03 (2024): 1–13. http://dx.doi.org/10.55041/ijsrem29193.
Full textSun, Shuang, Rong Du, and Shudong Chen. "A Secure and Computable Blockchain-Based Data Sharing Scheme in IoT System." Information 12, no. 2 (2021): 47. http://dx.doi.org/10.3390/info12020047.
Full textLing, Jie, Junwei Chen, Jiahui Chen, and Wensheng Gan. "Multiauthority Attribute-Based Encryption with Traceable and Dynamic Policy Updating." Security and Communication Networks 2021 (February 26, 2021): 1–13. http://dx.doi.org/10.1155/2021/6661450.
Full textKumaraswamy S, Ananth Prabhu Gurpur, Akashraj Raga, Sachin Popat Patil, Mustafa Basthikodi,. "Enhancing Data Privacy Protection in Cloud Computing Through Ciphertext-Policy Attribute-Based Encryption." Journal of Electrical Systems 20, no. 3s (2024): 1113–24. http://dx.doi.org/10.52783/jes.1425.
Full textHe, Zhongxiang, Yuling Chen, Yun Luo, Lingyun Zhang, and Yingying Tang. "Revocable and Traceable Undeniable Attribute-Based Encryption in Cloud-Enabled E-Health Systems." Entropy 26, no. 1 (2023): 45. http://dx.doi.org/10.3390/e26010045.
Full textGuo, Chong, Bei Gong, Muhammad Waqas, Hisham Alasmary, Shanshan Tu, and Sheng Chen. "An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things." Sensors 24, no. 21 (2024): 6843. http://dx.doi.org/10.3390/s24216843.
Full textYao, Yunfei, Huiyan Chen, Linzhi Shen, Ke Wang, and Qingnan Wang. "A CP-ABE Scheme Based on Lattice LWE and Its Security Analysis." Applied Sciences 13, no. 14 (2023): 8043. http://dx.doi.org/10.3390/app13148043.
Full textShi, Jiaoli, Chao Hu, Shunli Zhang, et al. "An Efficient and Expressive Fully Policy-Hidden Ciphertext-Policy Attribute-Based Encryption Scheme for Satellite Service Systems." ISPRS International Journal of Geo-Information 13, no. 9 (2024): 321. http://dx.doi.org/10.3390/ijgi13090321.
Full textLin, Han-Yu, and Yan-Ru Jiang. "A Multi-User Ciphertext Policy Attribute-Based Encryption Scheme with Keyword Search for Medical Cloud System." Applied Sciences 11, no. 1 (2020): 63. http://dx.doi.org/10.3390/app11010063.
Full textWang, Guangbo, and Jianhua Wang. "Research on Ciphertext-Policy Attribute-Based Encryption with Attribute Level User Revocation in Cloud Storage." Mathematical Problems in Engineering 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/4070616.
Full text