Multi-authority attribute-based encryption with efficient user revocation in cloud computing
An efficient user revocable multi-authority ABE scheme was proposed,a “hybrid decryption key” for each user isused to achieve efficient user revocation.Comparing with the existing schemes,this scheme is more effective in user revocation.In addition,the scheme can also achieve user dynamic privileges...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2016-02-01
|
| Series: | 网络与信息安全学报 |
| Subjects: | |
| Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00023 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1841530405027577856 |
|---|---|
| author | Liang-xuan ZHANG Hui LI |
| author_facet | Liang-xuan ZHANG Hui LI |
| author_sort | Liang-xuan ZHANG |
| collection | DOAJ |
| description | An efficient user revocable multi-authority ABE scheme was proposed,a “hybrid decryption key” for each user isused to achieve efficient user revocation.Comparing with the existing schemes,this scheme is more effective in user revocation.In addition,the scheme can also achieve user dynamic privileges management,partial data outsource encryption and ciphertext partially decrypted in the cloud server and shared data self-destruction after expiration. |
| format | Article |
| id | doaj-art-cd1b5852d38942fca7b816d91c2fa7ac |
| institution | Kabale University |
| issn | 2096-109X |
| language | English |
| publishDate | 2016-02-01 |
| publisher | POSTS&TELECOM PRESS Co., LTD |
| record_format | Article |
| series | 网络与信息安全学报 |
| spelling | doaj-art-cd1b5852d38942fca7b816d91c2fa7ac2025-01-15T03:04:23ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-02-012627459543957Multi-authority attribute-based encryption with efficient user revocation in cloud computingLiang-xuan ZHANGHui LIAn efficient user revocable multi-authority ABE scheme was proposed,a “hybrid decryption key” for each user isused to achieve efficient user revocation.Comparing with the existing schemes,this scheme is more effective in user revocation.In addition,the scheme can also achieve user dynamic privileges management,partial data outsource encryption and ciphertext partially decrypted in the cloud server and shared data self-destruction after expiration.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00023cloud computingaccess controlattribute-based encryptionmulti-authority,user revocation |
| spellingShingle | Liang-xuan ZHANG Hui LI Multi-authority attribute-based encryption with efficient user revocation in cloud computing 网络与信息安全学报 cloud computing access control attribute-based encryption multi-authority,user revocation |
| title | Multi-authority attribute-based encryption with efficient user revocation in cloud computing |
| title_full | Multi-authority attribute-based encryption with efficient user revocation in cloud computing |
| title_fullStr | Multi-authority attribute-based encryption with efficient user revocation in cloud computing |
| title_full_unstemmed | Multi-authority attribute-based encryption with efficient user revocation in cloud computing |
| title_short | Multi-authority attribute-based encryption with efficient user revocation in cloud computing |
| title_sort | multi authority attribute based encryption with efficient user revocation in cloud computing |
| topic | cloud computing access control attribute-based encryption multi-authority,user revocation |
| url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00023 |
| work_keys_str_mv | AT liangxuanzhang multiauthorityattributebasedencryptionwithefficientuserrevocationincloudcomputing AT huili multiauthorityattributebasedencryptionwithefficientuserrevocationincloudcomputing |