2020
DOI: 10.1109/jiot.2020.2993231
|View full text |Cite
|
Sign up to set email alerts
|

BC-SABE: Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
62
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 113 publications
(63 citation statements)
references
References 36 publications
1
62
0
Order By: Relevance
“…It maintains effective sharing and user revocation but does not take into account the privacy leakage caused by unprocessed policies. Liu et al [ 32 ] proposed a searchable ABE scheme BC-SABE that supports user revocation and outsourcing decryption, in which the blockchain replaces the centralized server. A group of AAs completes the generation of public parameters, key management and user revocation on the blockchain.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…It maintains effective sharing and user revocation but does not take into account the privacy leakage caused by unprocessed policies. Liu et al [ 32 ] proposed a searchable ABE scheme BC-SABE that supports user revocation and outsourcing decryption, in which the blockchain replaces the centralized server. A group of AAs completes the generation of public parameters, key management and user revocation on the blockchain.…”
Section: Related Workmentioning
confidence: 99%
“…If we calculate the update keys for each non-revoked user in the form of a list, the complexity is , where N is the number of users and R is the number of revoked users. In BT, the update keys only need to be calculated for the minimum covered nodes, the complexity is O ( NlogN / R ) [ 32 ]. The KUNode algorithm is as detailed in Algorithm 1 , where is a user binary tree, revl is the user revocation list, rejl is the user rejoin list, and and are the left and right child nodes of the node x respectively.…”
Section: Preliminariesmentioning
confidence: 99%
“…The attribute-based encryption (ABE) is an encryption technique widely used to ensure data security in IoV and IoT [29][30][31][32][33][34][35][36][37][38][39]. In order to provide cryptographic access control mechanism, ABE holds access control policies in the users' keys using a key-policy attribute-based encryption (KP-ABE) scheme or in the cipher-texts using a ciphertext-policy attribute-based encryption (CP-ABE) scheme [44].…”
Section: Attribute-based Encryptionmentioning
confidence: 99%
“…With the help of proxy reencryption and lazy reencryption techniques, Sun et al [15] presented a revocable ABKS scheme that can delegate the search and update workload to the cloud server. Liu et al [17] proposed a searchable ABE with efficient revocation and outsourced decryption for cloud IoT. Based on online/offline encryption and outsourced decryption techniques, Miao et al [40] presented an efficient ABKS scheme in the cloud-assisted healthcare IoT system.…”
Section: 22mentioning
confidence: 99%