2013
DOI: 10.1631/jzus.c1200240
|View full text |Cite
|
Sign up to set email alerts
|

Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(20 citation statements)
references
References 19 publications
0
20
0
Order By: Relevance
“…In this scheme, the access policy is determined by the data owner. Therefore, it is more suitable for access control applications that consist of four probabilistic polynomial time algorithms [18] as Setup, Encryption, Key Generation, and Decryption as shown in Fig. 2.…”
Section: Ciphertext Policy Attribute Based Encryption (Cp-abe)mentioning
confidence: 99%
“…In this scheme, the access policy is determined by the data owner. Therefore, it is more suitable for access control applications that consist of four probabilistic polynomial time algorithms [18] as Setup, Encryption, Key Generation, and Decryption as shown in Fig. 2.…”
Section: Ciphertext Policy Attribute Based Encryption (Cp-abe)mentioning
confidence: 99%
“…In this scheme, the access policy is determined by the data owner [11]. Therefore, it is more suitable for access control applications that consist of four probabilistic polynomial time algorithm [12] as Setup, Encryption, Key Generation, and Decryption as shown in Fig. 2.…”
Section: Ciphertext Policy Attribute Based Encryption (Cp-abe)mentioning
confidence: 99%
“…Another kind of solutions consist on using a proxy reencryption mechanism (PRE [7]) such as [8], [9], [10] and [11]. Proxies are provided in the network to absorb the overhead due to the re-encryption.…”
Section: Related Workmentioning
confidence: 99%
“…It requires a cloud storage provider to re-encrypt data for every user request. Y. Cheng et al considered in [9] a data storage and delivery system. They solution consists on combining proxy re-encryption (PRE) and (n, n) threshold scheme known as Secret Sharing Schemes (SSS).…”
Section: Related Workmentioning
confidence: 99%