Ciphertext-policy hierarchical attribute-based encryption for fine-grained access control of encryption data

被引:1
|
作者
Liu, Ximeng [1 ]
Ma, Jianfeng [2 ]
Xiong, Jinbo [2 ]
Liu, Guangjun [1 ,3 ]
机构
[1] School of Telecommunication Engineering, Xidian University, No. 2 South Taibai Road, Xi'an,710071, China
[2] School of Computer Science and Technology, Xidian University, No. 2 South Taibai Road, Xi'an,710071, China
[3] School of Mathematical and Computer Engineering, Xi'an University of Arts and Science, No. 168 South Taibai Road, Xi'an,710065, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:437 / 443
相关论文
共 50 条
  • [1] Fine-grained user access control in ciphertext-policy attribute-based encryption
    Hur, Junbeom
    Park, Chanil
    Hwang, Seong Oun
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (03) : 253 - 261
  • [2] Fine-Grained and Traceable Key Delegation for Ciphertext-Policy Attribute-Based Encryption
    Du, Jiajie
    HelIl, Nurmamat
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (09): : 3274 - 3297
  • [3] Fine-Grained Access Control for Cloud Data Sharing by Secure and Efficient Attribute-Revocable Ciphertext-Policy Attribute-Based Encryption
    Vaanchig, Nyamsuren
    Chen, Wei
    Qin, Zhiguang
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (10): : 303 - 319
  • [4] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [5] Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
    Deng, Hua
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    Zhang, Lei
    Liu, Jianwei
    Shi, Wenchang
    [J]. INFORMATION SCIENCES, 2014, 275 : 370 - 384
  • [6] Ciphertext-Policy Attribute-Based Encryption with Hiding Access Structure
    Yadav, Umesh Chandra
    [J]. 2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 23 - 27
  • [7] Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Li, Jiguo
    Wang, Haiping
    Zhang, Yichen
    Shen, Jian
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3339 - 3352
  • [8] Ciphertext-policy attribute-based delay encryption
    Chen, Lijiao
    Lv, Kewei
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (02) : 167 - 185
  • [9] Dynamic Ciphertext-Policy Attribute-Based Encryption for Expressive Access Policy
    Rao, Y. Sreenivasa
    Dutta, Ratna
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 275 - 286
  • [10] Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment
    Nayudu P.P.
    Sekhar K.R.
    [J]. Computer Systems Science and Engineering, 2023, 46 (01): : 1079 - 1092