2021
DOI: 10.1155/2021/6617669
|View full text |Cite
|
Sign up to set email alerts
|

User Privacy Protection Scheme Based on Verifiable Outsourcing Attribute-Based Encryption

Abstract: Given the rapid development of cloud computing and cloud storage technology, a growing number of enterprises and individuals use cloud storage services to save data or back up data. In the cloud storage services, although attribute-based encryption can protect users’ data security, the computational cost of key generation, data encryption, and data decryption linearly increases with the complexity of access strategies, which becomes more critical for resource-constrained users. Therefore, this paper proposes a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…Privacy protection services are designed to safeguard personal data and prevent unauthorized access, use, or disclosure [248]. Encryption is a key technology used in these services [249,250]. There are several other important technologies used in privacy protection services, such as IoT access control, privacy-aware authentication, single sign-on, virtual identity, and identity-as-a-service (IDaaS).…”
Section: Privacy Protection Servicesmentioning
confidence: 99%
“…Privacy protection services are designed to safeguard personal data and prevent unauthorized access, use, or disclosure [248]. Encryption is a key technology used in these services [249,250]. There are several other important technologies used in privacy protection services, such as IoT access control, privacy-aware authentication, single sign-on, virtual identity, and identity-as-a-service (IDaaS).…”
Section: Privacy Protection Servicesmentioning
confidence: 99%
“…Therefore, improving CP-ABE encryption/decryption efficiency is a non-trivial issue. As a result, researchers have made substantial efforts to enhance encryption and decryption efficiency [3][4][5][6][7][8][9][10][11][12][13][14][15][16]. Among them, [3][4][5][6][7] are about improving encryption efficiency.…”
Section: Introductionmentioning
confidence: 99%
“…Researchers have made efforts to address the efficiency concerns in decryption [8][9][10][11][12][13][14][15][16]. Green et al [8] introduced a CP-ABE scheme that outsources decryption operations to a third party.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations