2017
DOI: 10.1155/2017/6808190
|View full text |Cite
|
Sign up to set email alerts
|

Modified Ciphertext-Policy Attribute-Based Encryption Scheme with Efficient Revocation for PHR System

Abstract: Attribute-based encryption (ABE) is considered a promising technique for cloud storage where multiple accessors may read the same file. For storage system with specific personal health record (PHR), we propose a modified ciphertext-policy attribute-based encryption scheme with expressive and flexible access policy for public domains. Our scheme supports multiauthority scenario, in which the authorities work independently without an authentication center. For attribute revocation, it can generate different upda… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 25 publications
(67 reference statements)
0
6
0
Order By: Relevance
“…Figure 7 shows the execution time of the decryption process. From the Figure 7, it is clearly observed that the proposed method has lower time to decrypt the data, while comparing with Wang et al, 29 Zheng et al, 30 and Huang et al 15 The decryption time varies with respect to time and the number of access policy in attributes. Decryption time is almost the same in HABE 15 and proposed MCP-HABE scheme.…”
Section: Analysis Of Computational Timementioning
confidence: 84%
See 2 more Smart Citations
“…Figure 7 shows the execution time of the decryption process. From the Figure 7, it is clearly observed that the proposed method has lower time to decrypt the data, while comparing with Wang et al, 29 Zheng et al, 30 and Huang et al 15 The decryption time varies with respect to time and the number of access policy in attributes. Decryption time is almost the same in HABE 15 and proposed MCP-HABE scheme.…”
Section: Analysis Of Computational Timementioning
confidence: 84%
“…The execution time in signing phase is shown in Figure 8. From the Figure 8, it is clearly depicted that the proposed method has lower time in the signing process when compared with other three existing methods such as that of Wang et al, 29 Zheng et al, 30 and Huang et al 15 The signing process time is varied with respect to time and the number of access policy in attributes.…”
Section: (C) Execution Time Of Signing Phasementioning
confidence: 92%
See 1 more Smart Citation
“…Zahra et al [31] employed Shibboleth, also known as the security and cross-domain access control protocol between fog a client and a fog node, to achieve secure communication between nodes, even under uncertain network conditions. Zheng et al [32] utilized attribute-based encryption to enable data sharing over the network. In addition to the removal of attribute matching function, the use of the attribute bloom filter enabled hiding all attributes in the access control structure.…”
Section: Related Workmentioning
confidence: 99%
“…When a user is revoked, his attributes are revoked as well, a change in key and ciphertext has occurred within the user's group. Besides that, the author of [25] proposed a model where a user is revoked using a proxy for re-encryption. The revocation process is done through two methods: the first method is the attribute revocation, in which a user is revoked by updating the attributes for the rest of users associated in the policy.…”
Section: A Related Workmentioning
confidence: 99%