Page 3 - Attribute Based Encryption News Today : Breaking News, Live Updates & Top Stories | Vimarsana

Stay updated with breaking news from Attribute based encryption. Get real-time updates on events, politics, business, and more. Visit us for reliable news and exclusive interviews.

Top News In Attribute Based Encryption Today - Breaking & Trending Today

"Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism f" by Chunpeng Ge, Willy Susilo et al.

Cloud computing, which provides adequate storage and computation capability, has been a prevalent information infrastructure. Secure data sharing is a basic demand when data was outsourced to a cloud server. Attribute-based proxy re-encryption has been a promising approach that allows secure encrypted data sharing on clouds. With attribute-based proxy re-encryption, a delegator can designate a set of shared users through issuing a re-encryption key which will be used by the cloud server to transform the delegator's encrypted data to the shared users'. However, the existing attribute-based proxy re-encryption schemes lack a mechanism of revoking users from the sharing set which is critical for data sharing systems. Therefore, in this paper, we propose a concrete attribute-based proxy re-encryption with direct revocation mechanism (ABPRE-DR) for encrypted data sharing that enables the cloud server to directly revoke users from the original sharing set involved in the re-encrypt ....

Attribute Based Encryption , Cloud Computing , Data Sharing , Maintenance Engineering , Systems Architecture ,

"Balancing Privacy and Flexibility of Cloud-based Personal Health Recor" by Yudi Zhang, Fuchun Guo et al.

The Internet of Things and cloud services have been widely adopted in many applications, and personal health records (PHR) can provide tailored medical care. The PHR data is usually stored on cloud servers for sharing. Weighted ABE is a practical and flexible technique to protect PHR data. Under a weighted ABE policy, the data user's attributes will be “scored”, if and only if the score reaches the threshold value, they can access the data. However, while this approach offers a flexible access policy, the data owners have difficulty controlling their privacy, especially sharing PHR data in collaborative e-health systems. This paper aims to find a balance between privacy and flexibility and proposes an AND-weighted ABE scheme in cloud-based personal health records sharing systems. The proposed scheme can meet both privacy and flexibility. Only when the data user satisfies the scored-based policy and is in the specified organization(s), can the data user access the PHR data. Bes ....

Attribute Based Encryption , Cloud Computing , Medical Services , Rivacy Preserving And Flexible Access Control , Ecure Phr Date Sharing , Eighted Attribute ,

"Spatial Encryption Revisited: From Delegatable Multiple Inner Product " by Huy Quoc Le, Dung Hoang Duong et al.

Spatial encryption (SE), which involves encryption and decryption with affine/vector objects, was introduced by Boneh and Hamburg at Asiacrypt 2008. Since its introduction, SE has been shown as a versatile and elegant tool for implementing many other important primitives such as (Hierarchical) Identity-based Encryption ((H)IBE), Broadcast (H)IBE, Attribute-based Encryption, and Forward-secure cryptosystems. This paper revisits SE toward a more compact construction in the lattice setting. In doing that, we introduce a novel primitive called Delegatable Multiple Inner Product Encryption (DMIPE). It is a delegatable generalization of Inner Product Encryption (IPE) but different from the Hierarchical IPE (HIPE) (Okamoto and Takashima at Asiacrypt 2009). We point out that DMIPE and SE are equivalent in the sense that there are security-preserving conversions between them. As a proof of concept, we then successfully instantiate a concrete DMIPE construction relying on the hardness of the dec ....

Identity Based Encryption , Attribute Based Encryption , Delegatable Multiple Inner Product Encryption , Inner Product Encryption , Allow Deny List Encryption , Delegatable Multiple Inner Product Encryption , Ierarchical Inner Product Encryption , Inner Product Encryption , Attice Evaluation , Attice Trapdoors , Learning With Errors , Patial Encryption ,