2016
DOI: 10.1007/s11432-015-5449-9
|View full text |Cite
|
Sign up to set email alerts
|

Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
122
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 82 publications
(122 citation statements)
references
References 10 publications
0
122
0
Order By: Relevance
“…Security is a one of the major challenge in the adoption of cloud computing, in this paper we discussed various security challenges to the stored data in the cloud computing, also we have reviewed cryptography, some cryptographic scheme. This protocol purposed a method of data access control using the Location Based Cryptography-Geo Encryption [12], Attribute-Based Encryption Scheme-CP ABE [2] and the symmetric key cryptography [14]. This protocol ensures that data can be accessed only at the location which is specified by the data owner, so Location based Encryption adds another layer of security beyond the security which is provided using Symmetric Key cryptography and CP-ABE.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Security is a one of the major challenge in the adoption of cloud computing, in this paper we discussed various security challenges to the stored data in the cloud computing, also we have reviewed cryptography, some cryptographic scheme. This protocol purposed a method of data access control using the Location Based Cryptography-Geo Encryption [12], Attribute-Based Encryption Scheme-CP ABE [2] and the symmetric key cryptography [14]. This protocol ensures that data can be accessed only at the location which is specified by the data owner, so Location based Encryption adds another layer of security beyond the security which is provided using Symmetric Key cryptography and CP-ABE.…”
Section: Discussionmentioning
confidence: 99%
“…Many techniques have been purposed by the various researchers for the secure Access control in the cloud [13,14,15], Geo-Encryption technique was first purposed by Logan Scott, Dr. Dorothy Denning [16] to secure digital film distribution. In this paper, they purpose a solution for secure digital film distribution.…”
Section: Related Workmentioning
confidence: 99%
“…Authors in [ 13 ] proposed a searchable encryption scheme with the hidden strategy, and the hidden strategy is a major feature of the scheme. However, we find that the scheme is correct only if the data owner and the data user are the same one, this error is not easy to find as they use the same parameter r for the data owner and data user.…”
Section: Scheme Constructionmentioning
confidence: 99%
“…Miao Y et al[ 12 ] proposed a secure cryptographic primitive called as attribute-based multi-keyword search over encrypted personal health records in multi-owner setting to support both fine-grained access control and multi-keyword search via Ciphertext-Policy Attribute-Based Encryption. In [ 13 ], the authors propose a searchable encryption scheme for keywords in the hidden strategy. If the data user's attributes do not meet the access policy, the user cannot obtain the information of the access policy and cannot search for the encrypted data.…”
Section: Introductionmentioning
confidence: 99%
“…In order to enhance the flexibility of access policy, Wang and He [12] proposed a hidden policy scheme with LSSS matrix access structure. Recent works in this area focused on constructing more efficient ciphertext-policy hidden CP-ABE with short ciphertext size [13][14], developing schemes with additional applications such as keyword search [15][16].…”
Section: Introductionmentioning
confidence: 99%