搜索结果: 1-15 共查到“军队指挥学 attribute”相关记录150条 . 查询时间(0.14 秒)
Fast, Compact, and Expressive Attribute-Based Encryption
attribute-based encryption standard assumption non-monotone
2019/8/27
Attribute-based encryption (ABE) is an advanced cryptographic tool and useful to build various types of access control systems. Toward the goal of making ABE more practical, we propose key-policy (KP)...
ABFKS: Attribute-Based Encryption with Functional Keyword Search in Fog Computing
Attribute-based encryption Keyword search Fog computing
2019/8/2
We provide a new frame in this paper, the ciphertext-policy attribute-based encryption with functional keyword search (ABFKS) in fog computing. The ABFKS achieves functional keyword search and peer-pe...
Practical Attribute Based Inner Product Functional Encryption from Simple Assumptions
Functional Encryption Attribute Based Encryption Inner Product
2019/7/23
Functional encryption (FE) that bases on user attributes has many useful practical applications. For example, a company may only authorize department heads of other sections to query the average sale ...
Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX
Cloud Security Storage Protection Access Control, Policies
2019/6/12
Secure cloud storage is considered as one of the most important issues that both businesses and end-users take into account before moving their private data to the cloud. Lately, we have seen some int...
Attribute Based Encryption for Deterministic Finite Automata from DLIN
Attribute-based encryption deterministic finite automata decisional linear assumption
2019/6/5
Waters [Crypto, 2012] provided the first attribute based encryption scheme ABE for Deterministic Finite Automata (DFA) from a parametrized or ``q-type'' assumption over bilinear maps. Obtaining a cons...
Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE
Non-determinisitic Finite Automata Attribute based Encrytion Predicate Encryption
2019/6/4
Constructing Attribute Based Encryption (ABE) [SW05] for uniform models of computation from standard assumptions, is an important problem, about which very little is known. The only known ABE schemes ...
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based
Chameleon-Hash Implementation Blockchain
2019/4/23
Blockchain technologies recently received a considerable amount of attention. While the initial focus was mainly on the use of blockchains in the context of cryptocurrencies such as Bitcoin, applicati...
Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length
Attribute-based Signatures delegation hierarchy path anonymity
2019/4/16
With Attribute-based Signatures (ABS) users can simultaneously sign messages and prove compliance of their attributes, issued by designated attribute authorities, with some verification policy. Neithe...
Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs
attribute-based signatures arithmetic branching programs arithmetic span programs
2019/4/10
This paper presents the first attribute-based signature (ABS) scheme in which the correspondence between signers and signatures is captured in an arithmetic model of computation. Specifically, we desi...
Fully Secure Attribute-Based Encryption for $t$-CNF from LWE
attribute-based encryption ABE ciphertext policy
2019/4/10
Attribute-based Encryption (ABE), first introduced by [SW05,GPSW06], is a public key encryption system that can support multiple users with varying decryption permissions. One of the main properties o...
Multi-Authority Attribute-Based Encryption from LWE in the OT Model
attribute-based encryption LWE
2019/3/13
In a (ciphertext policy) attribute-based encryption (ABE) scheme, a ciphertext is associated with a predicate ϕϕ and a secret key is associated with a string xx such that a key decrypts a ci...
Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption
attribute-based encryption predicate encryption nested policy
2019/3/4
We present several transformations that combine a set of attribute-based encryption (ABE) schemes for simpler predicates into a new ABE scheme for more expressive composed predicates. Previous proposa...
Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures
attribute based signature anonymous credentials threshold cryptography
2019/3/1
In this work, we revisit multi-authority attribute based signatures (MA-ABS), and elaborate on the limitations of the current MA-ABS schemes to provide a hard to achieve (yet very useful) combination ...
The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing
Cloud Security Storage Protection Access Control
2018/12/19
Secure cloud storage is considered one of the most important issues that both businesses and end-users are considering before moving their private data to the cloud. Lately, we have seen some interest...
A fully distributed revocable ciphertext-policy hierarchical attribute-based encryption without pairing
Cloud computing Hierarchical attribute-based encryption Access control
2018/11/20
Several appealing features of cloud computing such as cost-effectiveness and user-friendliness have made many users and enterprises interested to outsource their sensitive data for sharing via cloud. ...