CP-ABE Scheme Using Selectively Hidden Tree Access Structure
Hidden access structure is a secure operation of Ciphertext Policy Attribute Base Encryption(CP-ABE),which can effectively prevent the leakage of sensitive information.However,tree access structure used by existing CP-ABE schemes are either completely open or completely hidden,which results in poor...
| Published in: | Jisuanji gongcheng |
|---|---|
| Main Author: | HAN Shuyan, Nurmamat Helil |
| Format: | Article |
| Language: | English |
| Published: |
Editorial Office of Computer Engineering
2020-07-01
|
| Subjects: | |
| Online Access: | https://www.ecice06.com/fileup/1000-3428/PDF/20200722.pdf |
Similar Items
Lazy-mode Ciphertext-update Based Approach for CP-ABE Attribute Change
by: LEI Xue-jiao, WANG Yin-long, Nurmamat HELIL
Published: (2022-10-01)
by: LEI Xue-jiao, WANG Yin-long, Nurmamat HELIL
Published: (2022-10-01)
CP-ABE Scheme Supports Fully Policy and Attribute Hidden
by: JIANG Luhan, TIAN Youliang, XIANG Axin
Published: (2024-12-01)
by: JIANG Luhan, TIAN Youliang, XIANG Axin
Published: (2024-12-01)
An access control scheme for IoT based on smart contracts and CP-ABE
by: SUN Changxia, et al.
Published: (2024-10-01)
by: SUN Changxia, et al.
Published: (2024-10-01)
An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption
by: Ronglei Hu, et al.
Published: (2023-09-01)
by: Ronglei Hu, et al.
Published: (2023-09-01)
Partially hidden policy multi-authority CP-ABE scheme with constant length ciphertext
by: LIU Yilong, et al.
Published: (2024-08-01)
by: LIU Yilong, et al.
Published: (2024-08-01)
Partially hidden policy multi-authority CP-ABE scheme with constant length ciphertext
by: LIU Yilong, et al.
Published: (2024-08-01)
by: LIU Yilong, et al.
Published: (2024-08-01)
Soft Set Decision and Cluster Percolation Method-Based Policy Clustering and Encryption Optimization for CP-ABE
by: Wei Liu, et al.
Published: (2024-01-01)
by: Wei Liu, et al.
Published: (2024-01-01)
White-box Traceable CP-ABE Scheme in Smart Healthcare Environment
by: FANG Zixuan, CAO Suzhen, YAN Junjian, LU Yanfei, HE Qizhi, WANG Caifen
Published: (2023-03-01)
by: FANG Zixuan, CAO Suzhen, YAN Junjian, LU Yanfei, HE Qizhi, WANG Caifen
Published: (2023-03-01)
Combining IOTA and Attribute-Based Encryption for Access Control in the Internet of Things
by: Yuanyu Zhang, et al.
Published: (2021-07-01)
by: Yuanyu Zhang, et al.
Published: (2021-07-01)
Attribute-Based Encryption Scheme Supporting Outsourcing and Revocation in Fog Computing
by: HUANG Fengming, TU Shanshan, MENG Yuan
Published: (2020-05-01)
by: HUANG Fengming, TU Shanshan, MENG Yuan
Published: (2020-05-01)
Attribute-based encryption with hidden policies in the access tree
by: Yan SONG, et al.
Published: (2015-09-01)
by: Yan SONG, et al.
Published: (2015-09-01)
Attribute-based encryption with hidden policies in the access tree
by: Yan SONG, et al.
Published: (2015-09-01)
by: Yan SONG, et al.
Published: (2015-09-01)
CP-ABE scheme supporting partially hidden access policy
by: LIU Xia, et al.
Published: (2024-10-01)
by: LIU Xia, et al.
Published: (2024-10-01)
Collusion-resistant dynamic privacy-preserving attribute-access control scheme based on blockchain
by: Xuanyang Hou, et al.
Published: (2023-09-01)
by: Xuanyang Hou, et al.
Published: (2023-09-01)
A Lightweight CP-ABE Scheme with Direct Attribute Revocation for Vehicular Ad Hoc Network
by: Yilong Liu, et al.
Published: (2023-06-01)
by: Yilong Liu, et al.
Published: (2023-06-01)
ABE Cubed: Advanced Benchmarking Extensions for ABE Squared
by: Sven Argo, et al.
Published: (2025-09-01)
by: Sven Argo, et al.
Published: (2025-09-01)
Multiauthority Ciphertext Policy-Attribute-Based Encryption (MA-CP-ABE) with Revocation and Computation Outsourcing for Resource-Constraint Devices
by: Xiaodan Yan, et al.
Published: (2023-10-01)
by: Xiaodan Yan, et al.
Published: (2023-10-01)
Lattices-Inspired CP-ABE from LWE Scheme for Data Access and Sharing Based on Blockchain
by: Taowei Chen, et al.
Published: (2023-06-01)
by: Taowei Chen, et al.
Published: (2023-06-01)
An Attribute-Based Encryption Scheme to Secure Fog Communications
by: Arwa Alrawais, et al.
Published: (2017-01-01)
by: Arwa Alrawais, et al.
Published: (2017-01-01)
Enhancing Secure Communication in the Cloud Through Blockchain Assisted-CP-DABE
by: G. Sucharitha, et al.
Published: (2023-01-01)
by: G. Sucharitha, et al.
Published: (2023-01-01)
An Attribute-based Encryption Scheme for Ciphertext Policy that Supports Attribute Revocation
by: WANG Jingyu, ZHOU Xuejuan
Published: (2021-07-01)
by: WANG Jingyu, ZHOU Xuejuan
Published: (2021-07-01)
Attribute-based revocable collaborative access control scheme
by: Changgen PENG, et al.
Published: (2021-05-01)
by: Changgen PENG, et al.
Published: (2021-05-01)
Attribute-based revocable collaborative access control scheme
by: Changgen PENG, et al.
Published: (2021-05-01)
by: Changgen PENG, et al.
Published: (2021-05-01)
An Efficient Revocable Attribute-Based Signcryption Scheme With Outsourced Unsigncryption in Cloud Computing
by: Ningzhi Deng, et al.
Published: (2020-01-01)
by: Ningzhi Deng, et al.
Published: (2020-01-01)
An Efficient and Expressive Fully Policy-Hidden Ciphertext-Policy Attribute-Based Encryption Scheme for Satellite Service Systems
by: Jiaoli Shi, et al.
Published: (2024-09-01)
by: Jiaoli Shi, et al.
Published: (2024-09-01)
Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud
by: Yunhong Zhou, et al.
Published: (2020-10-01)
by: Yunhong Zhou, et al.
Published: (2020-10-01)
Trusted access control mechanism for data with blockchain-assisted attribute encryption
by: Chang Liu, et al.
Published: (2025-06-01)
by: Chang Liu, et al.
Published: (2025-06-01)
Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing
by: Ruizhong DU, et al.
Published: (2022-06-01)
by: Ruizhong DU, et al.
Published: (2022-06-01)
Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing
by: Ruizhong DU, et al.
Published: (2022-06-01)
by: Ruizhong DU, et al.
Published: (2022-06-01)
CP-ABE based users collaborative privacy protection scheme for continuous query
by: Lei ZHANG, et al.
Published: (2017-09-01)
by: Lei ZHANG, et al.
Published: (2017-09-01)
CP-ABE based users collaborative privacy protection scheme for continuous query
by: Lei ZHANG, et al.
Published: (2017-09-01)
by: Lei ZHANG, et al.
Published: (2017-09-01)
Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain
by: Lin JIN, et al.
Published: (2022-08-01)
by: Lin JIN, et al.
Published: (2022-08-01)
Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain
by: Lin JIN, et al.
Published: (2022-08-01)
by: Lin JIN, et al.
Published: (2022-08-01)
RLWE-based key-policy ABE scheme
by: Ze-dong SUN, et al.
Published: (2016-10-01)
by: Ze-dong SUN, et al.
Published: (2016-10-01)
RLWE-based key-policy ABE scheme
by: Ze-dong SUN, et al.
Published: (2016-10-01)
by: Ze-dong SUN, et al.
Published: (2016-10-01)
TRE-DSP: A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
by: Yousheng Zhou, et al.
Published: (2025-04-01)
by: Yousheng Zhou, et al.
Published: (2025-04-01)
Blockchain data access control scheme based on CP-ABE algorithm
by: Yunxiang QIU, et al.
Published: (2020-06-01)
by: Yunxiang QIU, et al.
Published: (2020-06-01)
Fine-grained attribute update and outsourcing computing access control scheme in fog computing
by: Ruizhong DU, et al.
Published: (2021-03-01)
by: Ruizhong DU, et al.
Published: (2021-03-01)
Fine-grained attribute update and outsourcing computing access control scheme in fog computing
by: Ruizhong DU, et al.
Published: (2021-03-01)
by: Ruizhong DU, et al.
Published: (2021-03-01)
A Privacy-Preserving Authentication Scheme for a Blockchain-Based Energy Trading System
by: Seunghwan Son, et al.
Published: (2023-11-01)
by: Seunghwan Son, et al.
Published: (2023-11-01)
Similar Items
-
Lazy-mode Ciphertext-update Based Approach for CP-ABE Attribute Change
by: LEI Xue-jiao, WANG Yin-long, Nurmamat HELIL
Published: (2022-10-01) -
CP-ABE Scheme Supports Fully Policy and Attribute Hidden
by: JIANG Luhan, TIAN Youliang, XIANG Axin
Published: (2024-12-01) -
An access control scheme for IoT based on smart contracts and CP-ABE
by: SUN Changxia, et al.
Published: (2024-10-01) -
An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption
by: Ronglei Hu, et al.
Published: (2023-09-01) -
Partially hidden policy multi-authority CP-ABE scheme with constant length ciphertext
by: LIU Yilong, et al.
Published: (2024-08-01)
