2023
DOI: 10.32604/iasc.2023.032267
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Time and Location Information in Ciphertext-Policy Attribute-Based Encryption with Multi-Authorization

Abstract: Due to the mobility of users in an organization, inclusion of dynamic attributes such as time and location becomes the major challenge in Ciphertext-Policy Attribute-Based Encryption (CP-ABE). By considering this challenge; we focus to present dynamic time and location information in CP-ABE with multi-authorization. At first, along with the set of attributes of the users, their corresponding location is also embedded. Geohash is used to encode the latitude and longitude of the user's position. Then, decrypt ti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Since the amount of position data obtained from the signals emitted by the UAVs is very limited [17], it is necessary to have more UAVs emitting signals to adjust their positions to a given perimeter and to distribute them evenly as they deviate from the received position information. In order to keep the quantity of drones emitting signals under control [18], so as to achieve the alignment of drone locations with a smaller number of drones emitting signals, the goal decomposition method was chosen for accurate positioning of drones in this paper [19]. The nine UAVs are finally distributed on a certain circumference.…”
Section: Target Segmentation Methods For Repositioning Dronesmentioning
confidence: 99%
“…Since the amount of position data obtained from the signals emitted by the UAVs is very limited [17], it is necessary to have more UAVs emitting signals to adjust their positions to a given perimeter and to distribute them evenly as they deviate from the received position information. In order to keep the quantity of drones emitting signals under control [18], so as to achieve the alignment of drone locations with a smaller number of drones emitting signals, the goal decomposition method was chosen for accurate positioning of drones in this paper [19]. The nine UAVs are finally distributed on a certain circumference.…”
Section: Target Segmentation Methods For Repositioning Dronesmentioning
confidence: 99%
“…Attributebased searchable encryption based on ciphertext policy not only enables fine-grained access control of encrypted data, but also supports users to retrieve ciphertext based on keywords. Ciphertext Policy Attribute-Based Encryption Algorithm (CP-ABE) [3,4] autonomously set data access policies according to a set of attributes, and associate data access policies with ciphertexts. When the user's attribute set satisfies the access policy, the ciphertext can be decrypted using the corresponding attribute private key, while the specific identity of the decryptor remains unknown, which is suitable for "one-to-many" access scenarios.…”
Section: Introductionmentioning
confidence: 99%