2018
DOI: 10.1109/access.2018.2854600
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Compressed Ciphertext Length Scheme Using Multi-Authority CP-ABE for Hierarchical Attributes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…Our suggested structure does not include any background knowledge or preparation data and will define core concepts (or topics) depending on the nature of the conversation with the aid of the WorldNet vocabulary database [8]. In comparison, the term extraction method depends on the conceptual similarity of terms rather than on the frequency of terms [9]. Our technology is also in a role to determine the most important terms that can best reflect and interpret the knowledge in the chat session.…”
Section: Existing Methodologiesmentioning
confidence: 99%
“…Our suggested structure does not include any background knowledge or preparation data and will define core concepts (or topics) depending on the nature of the conversation with the aid of the WorldNet vocabulary database [8]. In comparison, the term extraction method depends on the conceptual similarity of terms rather than on the frequency of terms [9]. Our technology is also in a role to determine the most important terms that can best reflect and interpret the knowledge in the chat session.…”
Section: Existing Methodologiesmentioning
confidence: 99%
“…Numerous works of research such as revocable CP-ABE [25], lightweight CP-ABE [26], multi-authority CP-ABE [4,27], and large universe CP-ABE [28] have been developed in response to upgrading the competency of the Ciphertext Policy Attribute-based Encryption (CP-ABE) scheme. However, most of the schemes exposed the access policy in plaintext, which incurred privacy leakage.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, an intelligent wearable vital sensor engine supported by an abstract framework was developed. Due to high sensitivity of these data being exchanged by means of communication systems, data protection and security perspectives [4][5][6] have climbed the priority list for smart health mechanisms emphasizing on the importance of data being transferred securely and quickly.…”
Section: Related Workmentioning
confidence: 99%