2023
DOI: 10.1109/jsyst.2023.3283389
|View full text |Cite
|
Sign up to set email alerts
|

Attribute-Based Searchable Encryption in Edge Computing for Lightweight Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Achieve fine-grained searchable encryption in multi-user scenarios while attribute revocation for malicious data users. In the same year, Niu et al [20] proposed an attribute-based searchable encryption scheme for lightweight device edge computing. Achieve efficient data access and attribute revocation.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Achieve fine-grained searchable encryption in multi-user scenarios while attribute revocation for malicious data users. In the same year, Niu et al [20] proposed an attribute-based searchable encryption scheme for lightweight device edge computing. Achieve efficient data access and attribute revocation.…”
Section: Related Workmentioning
confidence: 99%
“…Achieve efficient data access and attribute revocation. The implementation of the scheme [14][15][16][17][18][19][20] attribute revocation all depend on the credibility of the server. Some scholars have proposed puncture encryption techniques.…”
Section: Related Workmentioning
confidence: 99%
“…Achieve efficient data access and attribute revocation. The implementation of the scheme [14][15][16][17][18][19][20] attribute revocation all depend on the credibility of the server. Some scholars have proposed puncture encryption techniques.…”
Section: Related Workmentioning
confidence: 99%