2023
DOI: 10.3390/e25040616
|View full text |Cite
|
Sign up to set email alerts
|

Online/Offline MA-CP-ABE with Cryptographic Reverse Firewalls for IoT

Abstract: Devices in the Internet of Things (IoT) usually use cloud storage and cloud computing to save storage and computing cost. Therefore, the efficient realization of one-to-many communication of data on the premise of ensuring the security of cloud storage data is a challenge. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) can not only protect the security of data in the cloud and achieve one-to-many communication but also achieve fine-grained access control for data. However, the single-authority CP-ABE fa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…In the realm of CP-ABE key security research [ [25] , [26] , [27] , [28] ], Li et al [ 29 ] introduced an innovative online/offline multi-authority CP-ABE scheme. This scheme leverages password reverse firewalls to safeguard against backdoor attacks and enhances the efficiency of MA-CP-ABE through an online/offline approach, consequently reducing storage and computational burdens for users.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the realm of CP-ABE key security research [ [25] , [26] , [27] , [28] ], Li et al [ 29 ] introduced an innovative online/offline multi-authority CP-ABE scheme. This scheme leverages password reverse firewalls to safeguard against backdoor attacks and enhances the efficiency of MA-CP-ABE through an online/offline approach, consequently reducing storage and computational burdens for users.…”
Section: Related Workmentioning
confidence: 99%
“…Although online/offline key generation techniques and cryptographic reverse firewalls, as seen in Refs. [ [29] , [30] , [31] ], can enhance the security of CP-ABE keys, preventing key leakage in an unreliable edge computing environment is an issue that needs additional attention. Additionally, while offloading some computational tasks to more powerful devices or cloud servers, as explored in Refs.…”
Section: Related Workmentioning
confidence: 99%
“…[21][22][23][24][25][26]. In order to address the issue of low efficiency in the operation of the medical Internet of Things, Li et al [27] proposed a flexible and efficient ciphertextpolicy attribute-based encryption scheme by integrating online/offline techniques and outsourced decryption. They also effectively ensured the security of the cryptographic algorithm through CRF.…”
Section: Online/offline Cryptographymentioning
confidence: 99%
“…If the corrupted functionality-maintaining implementation of party P cannot leak information through the CRF, then it is called CRF weakly exfiltration resistance. Further understanding of CRF can be found in reference [27].…”
Section: Cryptographic Reverse Firewallmentioning
confidence: 99%
See 1 more Smart Citation