2019
DOI: 10.2298/csis180912027t
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical authority based weighted attribute encryption scheme

Abstract: With the development of cloud storage technology, data storage security has become increasingly serious. Aiming at the problem that existing attributebased encryption schemes do not consider hierarchical authorities and the weight of attribute. A hierarchical authority based weighted attribute encryption scheme is proposed. This scheme will introduce hierarchical authorities and the weight of attribute into the encryption scheme, so that the authorities have a hierarchical relationship and different attributes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…However, the scheme only supports the linear secret sharing scheme (LSSS) [41] access structure. The ciphertext-policy weighted attribute-based encryption scheme supports threshold access structure [42]. This structure can consist of a threshold and many attributes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the scheme only supports the linear secret sharing scheme (LSSS) [41] access structure. The ciphertext-policy weighted attribute-based encryption scheme supports threshold access structure [42]. This structure can consist of a threshold and many attributes.…”
Section: Related Workmentioning
confidence: 99%
“…Later, a personalized key is generated using the secure two-party communication protocol without knowing by Center Trust Authority CTA and AA. The extended CP-ABE with key escrow protection scheme is described below [42]:…”
Section: 3mentioning
confidence: 99%
“…With the maturity of cloud computing technology, more and more outsourced data are stored in the cloud [1][2][3][4]. Worse still, the wrongdoers are tempted by the enormous value of digital asserts such as users' privacy and transaction records in this era of cloud computing [5]. They thus constantly attack the network for economic benefits [6].…”
Section: Introductionmentioning
confidence: 99%
“…Cryptography and watermarking are two other concepts used to provide digital information security. In cryptography, the encrypted output of the encryption algorithm attracts the third person's attention to extract the original message [5]. On the other hand, although both techniques have a data hiding scheme, the intent of watermarking is different from steganography.…”
Section: Introductionmentioning
confidence: 99%