2018
DOI: 10.1007/978-3-030-00009-7_38
|View full text |Cite
|
Sign up to set email alerts
|

A CP-ABE Access Control Scheme Based on Proxy Re-encryption in Cloud Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…Then the data is inverted and the maximum number of iterations of the algorithm is judged. If the maximum number of iterations has been reached, the inverted transformation is finished and the processed data is stored in the multi-target database at [15].…”
Section: Edge Cloud Unstructured Data Storage Network Topology Designmentioning
confidence: 99%
“…Then the data is inverted and the maximum number of iterations of the algorithm is judged. If the maximum number of iterations has been reached, the inverted transformation is finished and the processed data is stored in the multi-target database at [15].…”
Section: Edge Cloud Unstructured Data Storage Network Topology Designmentioning
confidence: 99%
“…Proxy re-encryption (PRE) was first proposed by Blaze et al [6], wherein semi-trusted proxy nodes use a re-encryption key to re-encrypt the ciphertext, allowing the delegatee to decrypt it. This approach achieves secure data sharing between the delegator and the delegatee without revealing the plaintext [7]. However, G et al [8] proposed a bidirectional PRE scheme that cannot guarantee the security of the delegator's data, and only supports one-to-one data sharing.…”
Section: Related Workmentioning
confidence: 99%
“…Threshold structure [8], tree-based access structure [10], [14], AND-gates [22] and linear secret sharing structure [23], [24] is often used to achieve access control in attribute-based encryption scheme. Here, we exploit a series of AND-gates with multi-valued attributes like [25] as our access structure.…”
Section: A Bilinear Mapmentioning
confidence: 99%