CP-ABE based users collaborative privacy protection scheme for continuous query
In location-based services (LBS),as the untrusted LBS server can be seen as an adversary,and it can utilize the attribute as background knowledge to correlate the real location of the user in the set of uncertain locations.Then the adversary can gain the location privacy when the user enjoys the sna...
| Published in: | Tongxin xuebao |
|---|---|
| Main Authors: | Lei ZHANG, Chun-guang MA, Song-tao YANG, Zeng-peng LI |
| Format: | Article |
| Language: | Chinese |
| Published: |
Editorial Department of Journal on Communications
2017-09-01
|
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2017184 |
Similar Items
CP-ABE based users collaborative privacy protection scheme for continuous query
by: Lei ZHANG, et al.
Published: (2017-09-01)
by: Lei ZHANG, et al.
Published: (2017-09-01)
Location privacy preserving scheme against attack from friends in SNS
by: Xi LIN, et al.
Published: (2016-10-01)
by: Xi LIN, et al.
Published: (2016-10-01)
Location privacy preserving scheme against attack from friends in SNS
by: Xi LIN, et al.
Published: (2016-10-01)
by: Xi LIN, et al.
Published: (2016-10-01)
Fine-grained access control scheme with user privacy protection in cloud storage systems
by: Min XIAO, et al.
Published: (2014-11-01)
by: Min XIAO, et al.
Published: (2014-11-01)
Fine-grained access control scheme with user privacy protection in cloud storage systems
by: Min XIAO, et al.
Published: (2014-11-01)
by: Min XIAO, et al.
Published: (2014-11-01)
CP-ABE Scheme Supports Fully Policy and Attribute Hidden
by: JIANG Luhan, TIAN Youliang, XIANG Axin
Published: (2024-12-01)
by: JIANG Luhan, TIAN Youliang, XIANG Axin
Published: (2024-12-01)
Cache-Based Privacy Protection Scheme for Continuous Location Query
by: Zhenpeng Liu, et al.
Published: (2023-01-01)
by: Zhenpeng Liu, et al.
Published: (2023-01-01)
Lattices-Inspired CP-ABE from LWE Scheme for Data Access and Sharing Based on Blockchain
by: Taowei Chen, et al.
Published: (2023-06-01)
by: Taowei Chen, et al.
Published: (2023-06-01)
A Blockchain Copyright Protection Scheme Based on CP-ABE Scheme with Policy Update
by: Jian Jiang, et al.
Published: (2024-07-01)
by: Jian Jiang, et al.
Published: (2024-07-01)
RLWE-based key-policy ABE scheme
by: Ze-dong SUN, et al.
Published: (2016-10-01)
by: Ze-dong SUN, et al.
Published: (2016-10-01)
RLWE-based key-policy ABE scheme
by: Ze-dong SUN, et al.
Published: (2016-10-01)
by: Ze-dong SUN, et al.
Published: (2016-10-01)
Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud
by: Yunhong Zhou, et al.
Published: (2020-10-01)
by: Yunhong Zhou, et al.
Published: (2020-10-01)
CP-ABE Scheme Using Selectively Hidden Tree Access Structure
by: HAN Shuyan, Nurmamat Helil
Published: (2020-07-01)
by: HAN Shuyan, Nurmamat Helil
Published: (2020-07-01)
Efficient strong privacy protection and transferable attribute-based ticket scheme
by: Huamin FENG, et al.
Published: (2022-03-01)
by: Huamin FENG, et al.
Published: (2022-03-01)
Efficient strong privacy protection and transferable attribute-based ticket scheme
by: Huamin FENG, et al.
Published: (2022-03-01)
by: Huamin FENG, et al.
Published: (2022-03-01)
Algorithm of blockchain data provenance based on ABE
by: Youliang TIAN, et al.
Published: (2019-11-01)
by: Youliang TIAN, et al.
Published: (2019-11-01)
Algorithm of blockchain data provenance based on ABE
by: Youliang TIAN, et al.
Published: (2019-11-01)
by: Youliang TIAN, et al.
Published: (2019-11-01)
Privacy-perserving scheme for social networks
by: Zhi-quan LV, et al.
Published: (2014-08-01)
by: Zhi-quan LV, et al.
Published: (2014-08-01)
Privacy-perserving scheme for social networks
by: Zhi-quan LV, et al.
Published: (2014-08-01)
by: Zhi-quan LV, et al.
Published: (2014-08-01)
LBS-oriented location privacy protection model and scheme
by: Song-tao YANG, et al.
Published: (2014-08-01)
by: Song-tao YANG, et al.
Published: (2014-08-01)
LBS-oriented location privacy protection model and scheme
by: Song-tao YANG, et al.
Published: (2014-08-01)
by: Song-tao YANG, et al.
Published: (2014-08-01)
A Blockchain-Based Secure Data Transaction and Privacy Preservation Scheme in IoT System
by: Jing Wu, et al.
Published: (2025-08-01)
by: Jing Wu, et al.
Published: (2025-08-01)
Lazy-mode Ciphertext-update Based Approach for CP-ABE Attribute Change
by: LEI Xue-jiao, WANG Yin-long, Nurmamat HELIL
Published: (2022-10-01)
by: LEI Xue-jiao, WANG Yin-long, Nurmamat HELIL
Published: (2022-10-01)
Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain
by: Lin JIN, et al.
Published: (2022-08-01)
by: Lin JIN, et al.
Published: (2022-08-01)
Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain
by: Lin JIN, et al.
Published: (2022-08-01)
by: Lin JIN, et al.
Published: (2022-08-01)
Privacy self-correlation privacy-preserving scheme in LBS
by: Weihao LI, et al.
Published: (2019-05-01)
by: Weihao LI, et al.
Published: (2019-05-01)
Privacy self-correlation privacy-preserving scheme in LBS
by: Weihao LI, et al.
Published: (2019-05-01)
by: Weihao LI, et al.
Published: (2019-05-01)
An anonymous entropy-based location privacy protection scheme in mobile social networks
by: Lina Ni, et al.
Published: (2019-04-01)
by: Lina Ni, et al.
Published: (2019-04-01)
Enhanced Location <i>K</i>-anonymity Privacy Protection Scheme Based on Geohash
by: LI Yongjun, ZHU Yuefei, BAI Lifang
Published: (2024-09-01)
by: LI Yongjun, ZHU Yuefei, BAI Lifang
Published: (2024-09-01)
Homomorphic encryption location privacy-preserving scheme based on Markov model
by: Kai ZHOU, et al.
Published: (2017-01-01)
by: Kai ZHOU, et al.
Published: (2017-01-01)
TRE-DSP: A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
by: Yousheng Zhou, et al.
Published: (2025-04-01)
by: Yousheng Zhou, et al.
Published: (2025-04-01)
An access control scheme for IoT based on smart contracts and CP-ABE
by: SUN Changxia, et al.
Published: (2024-10-01)
by: SUN Changxia, et al.
Published: (2024-10-01)
Efficient Access Control for Video Anomaly Detection Using ABE-Based User-Level Revocation with Ciphertext and Index Updates
by: Lu Jiang, et al.
Published: (2025-05-01)
by: Lu Jiang, et al.
Published: (2025-05-01)
A Personal Privacy Data Protection Scheme for Encryption and Revocation of High-Dimensional Attribute Domains
by: Caimei Wang, et al.
Published: (2023-01-01)
by: Caimei Wang, et al.
Published: (2023-01-01)
An Identity Privacy-Preserving Scheme against Insider Logistics Data Leakage Based on One-Time-Use Accounts
by: Nigang Sun, et al.
Published: (2023-11-01)
by: Nigang Sun, et al.
Published: (2023-11-01)
Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV
by: Ye Zhang, et al.
Published: (2022-11-01)
by: Ye Zhang, et al.
Published: (2022-11-01)
Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption
by: Tao FENG, et al.
Published: (2023-05-01)
by: Tao FENG, et al.
Published: (2023-05-01)
Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption
by: Tao FENG, et al.
Published: (2023-05-01)
by: Tao FENG, et al.
Published: (2023-05-01)
An Enhanced Approach for CP-ABE with Proxy Re-encryption in IoT Paradigm
by: Nishant Doshi
Published: (2022-09-01)
by: Nishant Doshi
Published: (2022-09-01)
White-box Traceable CP-ABE Scheme in Smart Healthcare Environment
by: FANG Zixuan, CAO Suzhen, YAN Junjian, LU Yanfei, HE Qizhi, WANG Caifen
Published: (2023-03-01)
by: FANG Zixuan, CAO Suzhen, YAN Junjian, LU Yanfei, HE Qizhi, WANG Caifen
Published: (2023-03-01)
Similar Items
-
CP-ABE based users collaborative privacy protection scheme for continuous query
by: Lei ZHANG, et al.
Published: (2017-09-01) -
Location privacy preserving scheme against attack from friends in SNS
by: Xi LIN, et al.
Published: (2016-10-01) -
Location privacy preserving scheme against attack from friends in SNS
by: Xi LIN, et al.
Published: (2016-10-01) -
Fine-grained access control scheme with user privacy protection in cloud storage systems
by: Min XIAO, et al.
Published: (2014-11-01) -
Fine-grained access control scheme with user privacy protection in cloud storage systems
by: Min XIAO, et al.
Published: (2014-11-01)
