2018
DOI: 10.1007/s12652-018-0967-0
|View full text |Cite
|
Sign up to set email alerts
|

A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 52 publications
(15 citation statements)
references
References 34 publications
0
15
0
Order By: Relevance
“…On account of the low efficiency in decryption, many researchers proposed outsourced CP-ABE, such as [21][22][23][24][25][26][27]. These schemes offload most of the complex computation in decryption to third party, such as cloud and fog node, to save cost for resource-poor devices.…”
Section: Related Workmentioning
confidence: 99%
“…On account of the low efficiency in decryption, many researchers proposed outsourced CP-ABE, such as [21][22][23][24][25][26][27]. These schemes offload most of the complex computation in decryption to third party, such as cloud and fog node, to save cost for resource-poor devices.…”
Section: Related Workmentioning
confidence: 99%
“…Premkamal et al [19] have developed a novel CP-ABE for the access control and privacy of big data. Their scheme minimizes the computation overhead of decryption and encryption by outsourcing large computations.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Later, different types of access structures for CP-ABE [16][17][18] were introduced. Outsourced CP-ABE schemes [13][14][15] and short ciphertext and fast decryption [6][7][8][9][10][11][12] schemes were proposed to improve the efficiency. Furthermore, to improve the CP-ABE scheme security, policy privacy and revocation [19][20][21][22][23][24][25][26][27] schemes were presented.…”
Section: Related Workmentioning
confidence: 99%