Cited By
View all- Chen JXiao HZheng YHassan MIanni MGuzzo AFortino G(2023)DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of ThingsInternet of Things10.1016/j.iot.2023.10087123(100871)Online publication date: Oct-2023
Attribute-based encryption (ABE) with outsourced decryption not only allows fine-grained and versatile sharing of encrypted data, but also largely mitigates the decryption overhead and the ciphertext size in the standard ABE schemes. Very recently, Xu et ...
Attribute-based encryption ABE allows one-to-many encryption with static access control. In many occasions, the access control policy must be updated and the original encryptor might be required to re-encrypt the message, which is impractical, since the ...
In a cipher text-policy ABE (CP-ABE) scheme, an encrypt or can express any access policy, stating what kind of receivers will be able to decrypt the message in the encryption algorithm. In most CP-ABE schemes, the size of cipher texts is not constant, ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inView or Download as a PDF file.
PDFView online with eReader.
eReaderView this article in HTML Format.
HTML Format