2013 10th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP) 2013
DOI: 10.1109/iccwamtip.2013.6716664
|View full text |Cite
|
Sign up to set email alerts
|

A searchable encryption of CP-ABE scheme in cloud storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 2 publications
0
9
0
Order By: Relevance
“…The authors of [36], combine the traditional CP-ABE algorithm and a homomorphic encryption algorithm to achieve a searchable ciphertext CP-ABE access control scheme. In their scheme, message is encrypted under homomorphic encryption methods and the key of homomorphic encryption is encrypted using CP-ABE.…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [36], combine the traditional CP-ABE algorithm and a homomorphic encryption algorithm to achieve a searchable ciphertext CP-ABE access control scheme. In their scheme, message is encrypted under homomorphic encryption methods and the key of homomorphic encryption is encrypted using CP-ABE.…”
Section: Related Workmentioning
confidence: 99%
“…al. [10] proposes CP-ABE (Ciphertext-Policy Attribute-Based Encryption) that owners which encryptors can define their own data access policies by themselves, that more suitable for the implementation of access control to shared data in the cloud storage environment. At present, a large number of research on the CP-ABE access control, and these scheme give more consideration to the flexibility of the attribute-based access control, or focus on fine-grained access control of encrypted data, and they less consider the result of cipher-text redundancy, or the keys update frequently.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Here, make reference [32] to homomorphic encryption algorithm as follows: Here, make reference [32] to homomorphic encryption algorithm as follows:…”
Section: Definitionmentioning
confidence: 99%
“…Homomorphic encryption According to the feature of homomorphic encryption, we can know that the output of data processed after homomorphic encryption and the output of decryption results for processing the original data that is not encrypted by the same method are the same. Here, make reference [32] to homomorphic encryption algorithm as follows:…”
Section: Definitionmentioning
confidence: 99%