2019
DOI: 10.1007/s11227-019-03111-1
|View full text |Cite
|
Sign up to set email alerts
|

Confidentiality-preserving based on attribute encryption using auditable access during encrypted records in cloud location

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…However, the drawback of Elmehdwi et al's algorithm is excessively high computational cost because SBD, SMIN, and SMIN n protocols use an encrypted binary array as input value. For example, when we perform the SMIN protocol between E(8) and E (7), clouds transform an encrypted decimal value into an encrypted binary array: E(8) (10) = {E(1), E(0), E(0), E(0)} (2) , E(7) (10) = {E(0), E(1), E(1), E(1)} (2) . After that, clouds perform the SMIN protocol between E(8) (10) = {E(1), E(0), E(0), E(0)} (2) and E(7) (10) = {E(0), E(1), E(1), E(1)} (2) .…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…However, the drawback of Elmehdwi et al's algorithm is excessively high computational cost because SBD, SMIN, and SMIN n protocols use an encrypted binary array as input value. For example, when we perform the SMIN protocol between E(8) and E (7), clouds transform an encrypted decimal value into an encrypted binary array: E(8) (10) = {E(1), E(0), E(0), E(0)} (2) , E(7) (10) = {E(0), E(1), E(1), E(1)} (2) . After that, clouds perform the SMIN protocol between E(8) (10) = {E(1), E(0), E(0), E(0)} (2) and E(7) (10) = {E(0), E(1), E(1), E(1)} (2) .…”
Section: Discussionmentioning
confidence: 99%
“…For example, when we perform the SMIN protocol between E(8) and E (7), clouds transform an encrypted decimal value into an encrypted binary array: E(8) (10) = {E(1), E(0), E(0), E(0)} (2) , E(7) (10) = {E(0), E(1), E(1), E(1)} (2) . After that, clouds perform the SMIN protocol between E(8) (10) = {E(1), E(0), E(0), E(0)} (2) and E(7) (10) = {E(0), E(1), E(1), E(1)} (2) . As a result, the SMIN requires high computational cost because it performs the encrypted operations as many times as the length of data domain in bit.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations