2014 Sixth International Symposium on Parallel Architectures, Algorithms and Programming 2014
DOI: 10.1109/paap.2014.11
|View full text |Cite
|
Sign up to set email alerts
|

KP-ABE with Attribute Extension: Towards Functional Encryption Schemes Integration

Abstract: To allow fine-grained access control of sensitive data, researchers have proposed various types of functional encryption schemes, such as identity-based encryption, searchable encryption and attribute-based encryption. We observe that it is difficult to define some complex access policies in certain application scenarios by using these schemes individually. In this paper, we attempt to address this problem by proposing a functional encryption approach named KeyPolicy Attribute-Based Encryption with Attribute E… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…When a new file is received, the Merkle tree is constructed and once when it finds that nodes are missing, it recognises that the data is corrupted or lost during transmission. For any given file size and update interval, the cost of update operations is minimised and it can be determined optimally (Huo et al, 2014). Smart grid has evolved as the next generation power grid.…”
Section: Related Workmentioning
confidence: 99%
“…When a new file is received, the Merkle tree is constructed and once when it finds that nodes are missing, it recognises that the data is corrupted or lost during transmission. For any given file size and update interval, the cost of update operations is minimised and it can be determined optimally (Huo et al, 2014). Smart grid has evolved as the next generation power grid.…”
Section: Related Workmentioning
confidence: 99%