vimarsana.com

Page 2 - Attribute Based Encryption News Today : Breaking News, Live Updates & Top Stories | Vimarsana

NTT DATA to jointly countermeasure data security risks with UTS in Australia, incorporating cutting edge encryption technology and stringent access controls

NTT DATA to jointly countermeasure data security risks with UTS in Australia, incorporating cutting edge encryption technology and stringent access controls
webwire.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from webwire.com Daily Mail and Mail on Sunday newspapers.

Chinese cyberespionage, confirmed and probable Five Eyes describe Russian cyberespionage tool Hacktivism in the hybrid war A new zero day

Chinese cyberespionage, confirmed and probable Five Eyes describe Russian cyberespionage tool Hacktivism in the hybrid war A new zero day
thecyberwire.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from thecyberwire.com Daily Mail and Mail on Sunday newspapers.

NTT Research CIS Lab Director Wins Second IACR Test-of-Time Award for Paper on Oblivious Transfer

Secure access privilege delegation using attribute-based encryption by Suryakanta Panda, Samrat Mondal et al

Attribute-based encryption (ABE) is widely used for a secure and efficient data sharing. The predetermined access policy of ABE shares the data with intended data users. However, ABE is not preferable in many applications that require collaboration among data users. In such applications, an authorized data user may be interested to collaborate with another data user who does not adhere to the access policy. Fixed access policy of ABE does not allow an authorized data user (who satisfies the access policy) to collaborate or share the data with any unauthorized data user (who fails to satisfy the access policy). Thus, due to the static and predefined access policy, data collaboration in ABE is significantly challenging. In this work, we attempt to address this important issue of ABE through proxy re-encryption mechanism. We have formally proved the security of our proposed system. Moreover, we have demonstrated that the proposed system permits revocation of delegation rights.

Attribute-Based Encryption with Reliable Outsourced Decryption in Clou by Chunpeng Ge, Zhe Liu et al

Outsourcing the heavy decryption computation to a cloud service provider has been a promising solution for a resource-constrained mobile device to deploy an attribute-based encryption scheme. However, the current attribute based encryption with outsourced decryption schemes only enable the mobile device to verify whether the cloud service provider has returned a correct decryption result, they lack a mechanism to enable the cloud service provider to escape from a mobile device's wrong claim if it has returned a correct decryption result. This paper, for the first time, proposes an attribute based encryption with reliable outsourced decryption scheme using the blockchain smart contract. In the proposed scheme, not only can the mobile device verify whether the cloud service provider has returned a correct decryption result, but also the cloud service provider can escape from a wrong claim if the returned decryption result is correct. Moreover, our system achieves the fairness proper

© 2025 Vimarsana

vimarsana © 2020. All Rights Reserved.