咨询与建议

限定检索结果

文献类型

  • 9 篇 期刊文献
  • 9 篇 会议

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17 篇 工学
    • 17 篇 计算机科学与技术...
    • 7 篇 电气工程
    • 7 篇 信息与通信工程
    • 2 篇 软件工程
    • 1 篇 控制科学与工程
  • 2 篇 理学
    • 2 篇 数学
    • 1 篇 系统科学

主题

  • 18 篇 multi-authority ...
  • 4 篇 access control
  • 3 篇 decentralized
  • 3 篇 blockchain
  • 3 篇 cloud computing
  • 3 篇 attribute-based ...
  • 2 篇 internet of thin...
  • 2 篇 outsourcing
  • 2 篇 threshold access...
  • 2 篇 user-attribute r...
  • 2 篇 encryption
  • 2 篇 user revocation
  • 2 篇 outsourcing decr...
  • 2 篇 ciphertext-polic...
  • 1 篇 ethereum
  • 1 篇 accountability
  • 1 篇 resource-constra...
  • 1 篇 scalability
  • 1 篇 independent mana...
  • 1 篇 redaction

机构

  • 2 篇 beihang univ eco...
  • 2 篇 soochow univ sch...
  • 2 篇 beihang univ sch...
  • 2 篇 hohai univ coll ...
  • 2 篇 minist educ key ...
  • 2 篇 beihang univ bei...
  • 2 篇 avic econ & tech...
  • 2 篇 fujian normal un...
  • 2 篇 south china norm...
  • 2 篇 dongguan polytec...
  • 1 篇 king abdulaziz u...
  • 1 篇 beihang univ sch...
  • 1 篇 fujian prov key ...
  • 1 篇 univ roma tor ve...
  • 1 篇 beijing univ tec...
  • 1 篇 fujian normal un...
  • 1 篇 garman normal un...
  • 1 篇 tinfoil ca usa
  • 1 篇 hanoi univ sci &...
  • 1 篇 univ sci & techn...

作者

  • 2 篇 ji qijin
  • 2 篇 huang kaiqing
  • 2 篇 yao wang
  • 2 篇 zhu yanqin
  • 2 篇 hu shengzhou
  • 2 篇 zhang yichen
  • 2 篇 wang wenhua
  • 2 篇 zhang xiao
  • 2 篇 wu faguo
  • 2 篇 wang zhao
  • 2 篇 shao jiaye
  • 2 篇 li jiguo
  • 1 篇 ba-lam do
  • 1 篇 zhan-jun wang
  • 1 篇 dargahi tooska
  • 1 篇 binh minh nguyen
  • 1 篇 xiong hu
  • 1 篇 abbas haider
  • 1 篇 verma tanya
  • 1 篇 van-duy pham

语言

  • 18 篇 英文
检索条件"主题词=Multi-Authority attribute-based encryption"
18 条 记 录,以下是1-10 订阅
排序:
multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation
Multi-authority attribute-based encryption scheme with const...
收藏 引用
13th International Conference on Information Security Practice and Experience (ISPEC) / 3rd International Symposium on Security and Privacy in Social Networks and Big Data (SocialSec)
作者: Zhang, Xiao Wu, Faguo Yao, Wang Wang, Zhao Wang, Wenhua Beihang Univ Sch Math & Syst Sci Beijing 100191 Peoples R China Beihang Univ Ecole Cent Pekin Sino French Engineer Sch Beijing Peoples R China Minist Educ Key Lab Math Informat & Behav Semant Beijing Peoples R China Beihang Univ Beijing Adv Innovat Ctr Big Data & Brain Comp Beijing Peoples R China AVIC Econ & Technol Res Estab Beijing Peoples R China
Ciphertext-policy attribute-based encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage system. It gives data owners direct and flexible control on access po... 详细信息
来源: 评论
multi-authority attribute-based encryption Resilient against Auxiliary-Input Leakage
收藏 引用
电脑学刊 2020年 第1期31卷 134-147页
作者: Hai-Ying Ma Zhan-Jun Wang Jin-Hua Wang Zhi-Jin Guan
The existing multi-authority attribute-based encryption (ABE) schemes cannot tolerate the secret key leakages under a variety of side-channel attacks. We integrate the auxiliary-input leakage model with dual system en... 详细信息
来源: 评论
Accountable and Revocable Large Universe Decentralized multi-authority attribute-based encryption for Cloud-Aided IoT
收藏 引用
IEEE ACCESS 2021年 9卷 123786-123804页
作者: Huang, Kaiqing Dongguan Polytech Modern Ind Innovat Practice Ctr Dongguan 523808 Peoples R China South China Normal Univ Sch Math Sci Guangzhou 510631 Peoples R China
The data collected, stored, shared, and accessed across different platforms in the dynamic IoT is mostly confidential and privacy-sensitive. Data security and access control issues urgently need to be addressed. multi... 详细信息
来源: 评论
multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2019年 第21期31卷
作者: Zhang, Xiao Wu, Faguo Yao, Wang Wang, Zhao Wang, Wenhua Beihang Univ Sch Math & Syst Sci Beijing 100191 Peoples R China Beihang Univ Ecole Cent Pekin Sino French Engineer Sch Beijing Peoples R China Minist Educ Key Lab Math Informat & Behav Semant Beijing Peoples R China Beihang Univ Beijing Adv Innovat Ctr Big Data & Brain Comp Beijing Peoples R China AVIC Econ & Technol Res Estab Beijing Peoples R China
Ciphertext-policy attribute-based encryption (CP-ABE) is regarded as one of the most suitable technologies for data access control in cloud storage system. It gives data owners direct and flexible control on access po... 详细信息
来源: 评论
Secure Online/Offline multi-authority attribute-based encryption for Resource-Constrained Devices in Cloud Computing  4
Secure Online/Offline Multi-Authority Attribute-Based Encryp...
收藏 引用
IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI)
作者: Shao, Jiaye Zhu, Yanqin Ji, Qijin Soochow Univ Sch Comp Sci & Technol Suzhou Peoples R China
multi-authority attribute-based encryption (MAABE) is regarded as a promising cryptographic technique to handle the problem of access control for data sharing, because it provides the fine-grained access control over ... 详细信息
来源: 评论
Privacy-Preserving Online/Offline and Outsourced multi-authority attribute-based encryption  16
Privacy-Preserving Online/Offline and Outsourced Multi-Autho...
收藏 引用
16th IEEE/ACIS International Conference on Computer and Information Science (ICIS)
作者: Shao, Jiaye Zhu, Yanqin Ji, Qijin Soochow Univ Sch Comp Sci & Technol Suzhou Peoples R China
attribute based encryption(ABE) is an efficient technique that exploits attributes and access policies to achieve fine-grained access control in cloud computing. Besides, outspread ABE schemes with multiple authoritie... 详细信息
来源: 评论
Revocable Large Universe Decentralized multi-authority attribute-based encryption Without Key Abuse for Cloud-Aided IoT
收藏 引用
IEEE ACCESS 2021年 9卷 151713-151728页
作者: Huang, Kaiqing South China Normal Univ Sch Math Sci Guangzhou 510631 Peoples R China Dongguan Polytech Modern Ind Innovat Practice Ctr Dongguan 523808 Peoples R China
Data confidentiality and access control are the key technologies of secure Internet of things (IoT) since the circulated application data on multiple different domains in IoT are generally confidential and privacy-sen... 详细信息
来源: 评论
A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing
收藏 引用
COMPUTER NETWORKS 2021年 195卷 108196-108196页
作者: Tu, Shanshan Waqas, Muhammad Huang, Fengming Abbas, Ghulam Abbas, Ziaul Haq Beijing Univ Technol Fac Informat Technol Engn Res Ctr Intelligent Percept & Autonomous Con Beijing 100124 Peoples R China Ghulam Ishaq Khan Inst Engn Sci & Technol Fac Comp Sci & Engn Topi 23460 Pakistan Ghulam Ishaq Khan Inst Engn Sci & Technol Fac Elect Engn Topi 23460 Pakistan
Fog computing is a revolutionary technology for the next generation to bridge the gap between cloud data centers and end-users. Fog computing is not a counterfeit for cloud computing but a persuasive counterpart. It a... 详细信息
来源: 评论
A survey on multi-authority and decentralized attribute-based encryption
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2022年 第1期13卷 515-533页
作者: Oberko, Prince Silas Kwesi Obeng, Victor-Hillary Kofi Setornyo Xiong, Hu Univ Elect Sci & Technol China Sch Informat & Software Engn Chengdu 610054 Peoples R China
The introduction of attribute-based encryption (ABE) targets to achieve the implementation of single-to-numerous encryption;however, the sole authority challenge and the issue of distributed management of attributes a... 详细信息
来源: 评论
A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation
收藏 引用
SOFT COMPUTING 2020年 第3期24卷 1869-1882页
作者: Li, Jiguo Hu, Shengzhou Zhang, Yichen Han, Jinguang Fujian Normal Univ Coll Math & Informat Fuzhou 350117 Fujian Peoples R China Hohai Univ Coll Comp & Informat Nanjing 211100 Jiangsu Peoples R China Fujian Normal Univ Fujian Prov Key Lab Network Secur & Cryptol Fujian Peoples R China Gannan Normal Univ Math & Comp Sci Dept Ganzhou 341000 Jiangxi Peoples R China Nanjing Univ Finance & Econ Jiangsu Prov Key Lab E Business Nanjing 210003 Peoples R China
To ensure security and obtain fine-grained data access control policies in many management domains, multi-authority attribute-based encryption (MA-ABE) schemes were presented and have been applied in cloud storage sys... 详细信息
来源: 评论