The cloud allows clients to store and share data.Depending on the user’s needs,it is imperative to design an effective access control plan to share the information only with approved users.The user loses control of t...
supported in part by National Natural Science Foundation of China(Grant No.61802214);National Natural Science Foundation of Shandong Province,China(Grant No.ZR2019BF009);Applied Fundamental Research Project of Qingdao(Grant No.19-6-2-6-cg);Foundation of Guizhou Provincial Key Laboratory of Public Big Data(Grant No.2019BDKFJJ007)。
Dear editor,To maintain the confidentiality of the sensitive data,users tend to encrypt their data under an associated access policy(or attributes)before outsourcing them to the cloud.In the traditional access control...
supported by the National Natural Science Foundation of China(No.61572460,No.61272481);the National Key Research and Development Project(No.2016YFB0800703);Open Fund of Beijing Key Laboratory of IOT Information Security Technology(No.J6V0011104);the China Postdoctoral Science Foundation(No.2015M582622);the National Information Security Special Projects of National Development,the Reform Commission of China(No.(2012)1424);the China 111 Project(No.B16037)
Ciphertext policy attribute-based encryption(CP-ABE)is becoming a new primitive for finegrained access control.It neither produces multiple encrypted copies of the same data nor suffers from the severe burden of key d...
supported by National Natural Science Foundation of China (Grant Nos. 61202179, 61173089, 61472298, 61472310, U1405255, 61502248);National High-Tech R&D Program (863) (Grant No. 2015AA016007);SRF for ROCS, SEM and Fundamental Research Funds for the Central Universities
Attribute-Based Encryption(ABE) is a promising new cryptographic technique which guarantees fine-grained access control of outsourced encrypted data in the cloud. With the help of ABE, the majority of security issue...
Attribute-based encryption is drawing more attention with its inherent attractive properties which are potential to be widely used in the newly developing cloud computing. However, one of the main obstacles for its ap...