2013
DOI: 10.1002/sec.806
|View full text |Cite
|
Sign up to set email alerts
|

Publishing and sharing encrypted data with potential friends in online social networks

Abstract: Making friends by publishing and sharing personal data in a special interest group has become popular in online social networks. Data security is a major concern, as digital content can be easily accessed from all over the Internet, and the online social network service provider is often for profit and semi‐trusted. The standard solution to data security is encryption, but sharing of encrypted data then becomes a challenging task. In this paper, employing attribute‐based encryption (ABE), we propose Masque+, a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…The proxy agent re-encrypts the ciphertext by the latest proxy key, and refreshes all the private keys held by the legal users. Shuai et al improved the Masque and achieved immediate user revocation by updating corresponding secret parameters related to the revoked attributes [17]. However, these immediate user revocation schemes will cause the key update operation of large numbers of users in OSNs.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The proxy agent re-encrypts the ciphertext by the latest proxy key, and refreshes all the private keys held by the legal users. Shuai et al improved the Masque and achieved immediate user revocation by updating corresponding secret parameters related to the revoked attributes [17]. However, these immediate user revocation schemes will cause the key update operation of large numbers of users in OSNs.…”
Section: Related Workmentioning
confidence: 99%
“…The comparison results are shown in Table 1. Compared with access control schemes based on ABE [11,12,13,17], our scheme encrypts the data with DK using symmetric encryption algorithm, and encrypts the DK based on CP-ABE, which is more efficient. Besides, our scheme supports the multiparty access control based on CP-ABPRE, and allows multiple controllers include the owner and the disseminator to customize access policies.…”
Section: Comparisonmentioning
confidence: 99%
“…In the second paper, “Publishing and Sharing Encrypted Data with Potential Friends in Online Social Networks” , Shuai and Zhu propose a full‐fledged access control scheme called Masque+ for online social networks employing attribute‐based encryption. With Masque+, one can publish and share his encrypted data with potential new friends who have the same interests just as in a masquerade with various themes.…”
mentioning
confidence: 99%