2019
DOI: 10.1016/j.jnca.2019.01.003
|View full text |Cite
|
Sign up to set email alerts
|

Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 58 publications
(21 citation statements)
references
References 9 publications
0
21
0
Order By: Relevance
“…The scheme however could not totally solve the key escrow issue. Our previous work in [11] follows the work [19] by removing the CA and putting trust upon the data owner for secret parameters generation in order to solve the key escrow problem. In this paper, we improve and adapt our previous work [11] into the type-based proxy re-encryption environment in order to build our solution.…”
Section: Attribute Based Encryptionmentioning
confidence: 99%
See 3 more Smart Citations
“…The scheme however could not totally solve the key escrow issue. Our previous work in [11] follows the work [19] by removing the CA and putting trust upon the data owner for secret parameters generation in order to solve the key escrow problem. In this paper, we improve and adapt our previous work [11] into the type-based proxy re-encryption environment in order to build our solution.…”
Section: Attribute Based Encryptionmentioning
confidence: 99%
“…We consider in our system four main entities, namely, the data owner (DO), a set of attribute authorities (AA) logically playing the same role but managing disjoint sets of attributes, the cloud service provider (CSP) also considered as proxy server, and hosting the cloud user assistant (CUA) described in [11], and finally the data user (DU).…”
Section: Problem Statementmentioning
confidence: 99%
See 2 more Smart Citations
“…In [8], encryption scheme has an intuitive key distribution mechanism to enable data access. In [9], there is a masked part of the secret key between the data user and attribute authorities. In [10], two separate cloud systems that communicate with each other are required and the data user must be authenticated.…”
Section: Introductionmentioning
confidence: 99%