2023
DOI: 10.3390/info14050281
|View full text |Cite
|
Sign up to set email alerts
|

A Blockchain-Based Efficient and Verifiable Attribute-Based Proxy Re-Encryption Cloud Sharing Scheme

Abstract: When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine-grained access. The attribute-based encryption scheme can be used for this purpose. Additionally, attribute-based proxy re-encryption (ABPRE) can generate a secret key using the delegatee’s secret key and access policy to re-encrypt the ciphertext, allowing fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…J. Cui et al proposed an attribute-based cloud-edge data sharing scheme suitable for scenarios where both the sender and storage of data could be dishonest [11]. X. Wang et al [3] coordinated functional encryption with blockchain, proposing a reliable and privacy-aware access control system named R-PAC; T. Feng et al [2] combined solutions based on Attribute-Based Encryption (ABE) and Identity-Based Encryption (IBE) to achieve efficient data sharing and data correctness verification. W. Liang et al [4] developed a fine-grained access control system based on Ciphertext-Policy Attribute-Based Encryption (CP-ABE).…”
Section: Related Workmentioning
confidence: 99%
“…J. Cui et al proposed an attribute-based cloud-edge data sharing scheme suitable for scenarios where both the sender and storage of data could be dishonest [11]. X. Wang et al [3] coordinated functional encryption with blockchain, proposing a reliable and privacy-aware access control system named R-PAC; T. Feng et al [2] combined solutions based on Attribute-Based Encryption (ABE) and Identity-Based Encryption (IBE) to achieve efficient data sharing and data correctness verification. W. Liang et al [4] developed a fine-grained access control system based on Ciphertext-Policy Attribute-Based Encryption (CP-ABE).…”
Section: Related Workmentioning
confidence: 99%