2021
DOI: 10.1109/jsyst.2020.2996216
|View full text |Cite
|
Sign up to set email alerts
|

An Expressive “Test-Decrypt-Verify” Attribute-Based Encryption Scheme With Hidden Policy for Smart Medical Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(16 citation statements)
references
References 36 publications
0
8
0
Order By: Relevance
“…Although both literature [7] and this paper use a symmetric key to encrypt files, only this paper realizes the update of the symmetric key and its ciphertext and revocation in a complete sense. In addition, literature [2,37] only implemented the function of policy hiding. Our proposed scheme also supports searchable encryption and introduces blockchain to prevent repudiation.…”
Section: Functional Comparisonmentioning
confidence: 99%
See 2 more Smart Citations
“…Although both literature [7] and this paper use a symmetric key to encrypt files, only this paper realizes the update of the symmetric key and its ciphertext and revocation in a complete sense. In addition, literature [2,37] only implemented the function of policy hiding. Our proposed scheme also supports searchable encryption and introduces blockchain to prevent repudiation.…”
Section: Functional Comparisonmentioning
confidence: 99%
“…The most important thing is that our scheme can manage rights in a complete sense in terms of users, user attributes, and file attributes. LSSS N/A [37] LSSS N/A [7] Access ree Ours Access ree…”
Section: Functional Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…In [31], the authors eliminated all redundant attributes in the access policy, and their approach significantly reduced computation overhead. With the same intention, the author of [32] proposed the 'testdecrypt-verify' approach to reduce the computation cost in their CP-ABE scheme. In their scheme, the testing phase is added before the encryption phase, and the new component, Outsourcing Cloud Server, is adopted as an outsource agent to reduce the decryption calculation.…”
Section: Related Workmentioning
confidence: 99%
“…In traditional CP-ABE scheme [3], the data owner (DO) uploads the access policy and ciphertext to the cloud service provider (CSP) for storage. When utilizing the access policy in plaintext, it is possible for unauthorized users and the CSP to observe access policy attributes in ciphertexts [6], which could cause leakage of privacy for DOs and users. In response to the above problems, a partially hidden policy CP-ABE scheme (PHP-CP-ABE) [7] was proposed by researchers.…”
Section: Introductionmentioning
confidence: 99%