2020
DOI: 10.1016/j.tcs.2020.02.030
|View full text |Cite
|
Sign up to set email alerts
|

A fully distributed hierarchical attribute-based encryption scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 32 publications
(9 citation statements)
references
References 22 publications
0
9
0
Order By: Relevance
“…Other works use hierarchical attribute-based access models, e.g. [19,20,[30][31][32]. For example, [19] presents a hierarchical Multi-Dimensional Access Control (MD-AC) model for the authorization of multiple participants in the cloud.…”
Section: Related Workmentioning
confidence: 99%
“…Other works use hierarchical attribute-based access models, e.g. [19,20,[30][31][32]. For example, [19] presents a hierarchical Multi-Dimensional Access Control (MD-AC) model for the authorization of multiple participants in the cloud.…”
Section: Related Workmentioning
confidence: 99%
“…Other works use hierarchical attribute-based access models, e.g., [25][26][27][28][29]. For example, Ref.…”
Section: Related Workmentioning
confidence: 99%
“…Meng et al [27] aiming at the problem of illegal access to private and sensitive information in smart cities proposed a new keyword search CP-ABE scheme to encrypt or decrypt Internet of things (IoT) data in cloud storage. Ali et al [9] proposed an efficient multiauthority access control scheme for the employee attribute scenarios of large companies, which realized privacy protection, multiauthority access control, and fine-grained access control to stored data. De Oliveira et al [28] aimed at the problem that the healthcare professional could not obtain the patient's complete electronic medical records (EMRs) in the medical emergency situation and proposed a protocol based on CP-ABE scheme, through which all the treatment teams participating in the emergency rescue can security decrypt the relevant data of the patient's EMRs.…”
Section: Related Workmentioning
confidence: 99%
“…Multiauthority CP-ABE constructions [8] It can realize fine-grained distributed access authority and can be divided into centralized CP-ABE and distributed CP-ABE according to whether there is a central organization. Hierarchical CP-ABE constructions [9][10][11][12][13] It can achieve hierarchical fine-grained access control. e delegation of access privilege is organized in a hierarchical manner.…”
Section: Cp-abe Category Descriptionmentioning
confidence: 99%