CP-ABE scheme supporting partially hidden access policy
Most of the existing ciphertext-policy attribute-based encryption (CP-ABE) schemes that support outsourced decryption do not consider the privacy protection of the ciphertext access policy, while some schemes that support policy hidden have the problem of low access policy matching efficiency. There...
Saved in:
| Main Authors: | LIU Xia, WANG Xinzu, ZHANG Tao, CHEN Yingge, WANG Rong, FENG Chaosheng, QIN Zhiguang |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2024-10-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024179/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
SM9‑based CP‑ABE Access Control Scheme under Power IoT
by: ZHANG Yanjie, et al.
Published: (2025-05-01) -
Blockchain data access control scheme based on CP-ABE algorithm
by: Yunxiang QIU, et al.
Published: (2020-06-01) -
Verifiable access control scheme based on unpaired CP-ABE in fog computing
by: Jiangtao DONG, et al.
Published: (2021-08-01) -
CP-ABE based data access control for cloud storage
by: SUN Guo-zi1, et al.
Published: (2011-01-01) -
Key public verifiable MA-CP-ABE scheme based on aggregatable PVSS and consortium blockchain
by: JING Xu, et al.
Published: (2024-08-01)