2015
DOI: 10.1016/j.future.2014.10.010
|View full text |Cite
|
Sign up to set email alerts
|

A lightweight attribute-based encryption scheme for the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
149
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 295 publications
(168 citation statements)
references
References 22 publications
0
149
0
Order By: Relevance
“…However, the approach is not general (it is based on Linux) and is limited by a very abstract description of resources and also the description is restricted to a very few number of predefined general attributes. In addition to the attributed-based description languages, there are a number of recent attributedbased (resource information) encryption methods in the current literature including [154][155][156][157][158][159] which are mostly applicationoriented. And in fact, they are not flexible and even efficient to be used for different applications.…”
Section: Ontology and Resource Descriptionmentioning
confidence: 99%
“…However, the approach is not general (it is based on Linux) and is limited by a very abstract description of resources and also the description is restricted to a very few number of predefined general attributes. In addition to the attributed-based description languages, there are a number of recent attributedbased (resource information) encryption methods in the current literature including [154][155][156][157][158][159] which are mostly applicationoriented. And in fact, they are not flexible and even efficient to be used for different applications.…”
Section: Ontology and Resource Descriptionmentioning
confidence: 99%
“…However, the approach is not general (it is based on linux) and is limited by very abstract description of resources and also the description is restricted to a very few number of predefined general attributes. In addition to the attributed-based description languages, there are a number of [64][65][66][67][68][69] which are mostly application-oriented. And in fact, they are not really flexible and even efficient to be used for different applications (in this paper we proposed our own encryption method).…”
Section: Resource Descriptionmentioning
confidence: 99%
“…The lABE scheme of [10] based on elliptic curve cryptography consists of Setup, Encryption, Key-Generation, and Decryption algorithms.…”
Section: Lightweight Abe Schemementioning
confidence: 99%
“…In the lABE scheme [10], secret sharing based on Lagrange interpolation [Shamir] is used to reconstruct the decryption key.…”
Section: Labedecryptmentioning
confidence: 99%
See 1 more Smart Citation