2013
DOI: 10.1093/comjnl/bxt039
|View full text |Cite
|
Sign up to set email alerts
|

Attribute-Based Data Transfer with Filtering Scheme in Cloud Computing

Abstract: Attribute-based data transfer with filtering scheme in cloud computing Attribute-based data transfer with filtering scheme in cloud computing Abstract Abstract Data transfer is a transmission of data over a point-to-point or point-to-multipoint communication channel. To protect the confidentiality of the transferred data, public-key cryptography has been introduced in data transfer schemes (DTSs). Data transfer is a transmission of data over a point-to-point or point-to-multipoint communication channel. To pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 47 publications
0
8
0
Order By: Relevance
“…Given that N is difficult to factor, the value of its Euler function f(N) = (p À 1)(q À 1) is also difficult to compute. Equation (14) will be replaced with equation (15)…”
Section: Our Improved Scheme Imentioning
confidence: 99%
See 2 more Smart Citations
“…Given that N is difficult to factor, the value of its Euler function f(N) = (p À 1)(q À 1) is also difficult to compute. Equation (14) will be replaced with equation (15)…”
Section: Our Improved Scheme Imentioning
confidence: 99%
“…According to equation (15), it is difficult for the adversary to compute B 1 . Although the value of N is public, f(N) is difficult to be computed.…”
Section: Our Improved Scheme Imentioning
confidence: 99%
See 1 more Smart Citation
“…Later, Goyal et al classified ABE schemes into two types: key‐policy ABE (KP‐ABE) and ciphertext‐policy ABE (CP‐ABE). In KP‐ABE schemes , secret keys are associated with access structures, while the ciphertext is labeled with sets of attributes. On the reverse, in CP‐ABE schemes , secret keys are labeled with sets of attributes, while ciphertexts are associated with access structures.Attribute‐based encryption has attracted lots of attentions as it can express flexible access structures.…”
Section: Introductionmentioning
confidence: 99%
“…On the reverse, in CP‐ABE schemes , secret keys are labeled with sets of attributes, while ciphertexts are associated with access structures.Attribute‐based encryption has attracted lots of attentions as it can express flexible access structures. However, the computation cost and communication cost in previous ABE schemes are linear with the number of required attributes . Hence, previous schemes cannot be used in the device with limited store space and computation power.…”
Section: Introductionmentioning
confidence: 99%