A survey on attribute-based encryption schemes of access control in cloud environments

被引:0
|
作者
机构
[1] Lee, Cheng-Chi
[2] Chung, Pei-Shan
[3] Hwang, Min-Shiang
来源
Hwang, M.-S. (mshwang@asia.edu.tw) | 1600年 / Femto Technique Co., Ltd.卷 / 15期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] ABSTRACT: Access Control in Searchable Encryption with the use of Attribute-Based Encryption and SGX
    Michalas, Antonis
    Bakas, Alexandros
    Hai-Van Dang
    Zalitko, Alexandr
    CCSW'19: PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON CLOUD COMPUTING SECURITY WORKSHOP, 2019, : 183 - 183
  • [32] Unidirectional proxy re-encryption for access structure transformation in attribute-based encryption schemes
    Fu, Xingbing
    International Journal of Network Security, 2015, 17 (02) : 142 - 149
  • [33] New access control systems based on outsourced attribute-based encryption
    Li, Jin
    Chen, Xiaofeng
    Li, Jingwei
    Jia, Chunfu
    Ma, Jianfeng
    Lou, Wenjing
    JOURNAL OF COMPUTER SECURITY, 2015, 23 (06) : 659 - 683
  • [34] Attribute-based Encryption in Cloud Computing Environment
    Yan, Yuping
    Kamel, Mohammed B. M.
    Ligeti, Peter
    2020 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE, 2020, : 63 - 68
  • [35] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    SOFSEM 2015: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2015, 8939 : 566 - 577
  • [36] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    INFOCOMMUNICATIONS JOURNAL, 2015, 7 (02): : 1 - 9
  • [37] Efficient Anonymous Attribute-Based Encryption with Access Policy Hidden for Cloud Computing
    Huang, Chanying
    Yan, Kedong
    Wei, Songjie
    Zhang, Gongxuan
    Lee, Dong Hoon
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC 2017), 2017, : 266 - 270
  • [38] Attribute-based encryption with Hidden access structures
    Wang, Hai-Bin
    Chen, Shao-Zhen
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2012, 34 (02): : 457 - 461
  • [39] Attribute-Based Keyword Search and Data Access Control in Cloud
    Li, Jiazhi
    Zhang, Lei
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 382 - 386
  • [40] Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage
    Zhong, Hong
    Zhu, Wenlong
    Xu, Yan
    Cui, Jie
    SOFT COMPUTING, 2018, 22 (01) : 243 - 251