2022
DOI: 10.1109/tsc.2021.3073740
|View full text |Cite
|
Sign up to set email alerts
|

Secure Outsourced Attribute-Based Sharing Framework for Lightweight Devices in Smart Health Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
25
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(25 citation statements)
references
References 42 publications
0
25
0
Order By: Relevance
“…The decryption time of our scheme 0.024 regardless the number of attributes in access policy. On another hand, the impact of number of attributes is clear in Figure . 4 for Jin et al [13] and Zhang et al [4] schemes. for example, the execution time of encryption operation when the number of attributes is three is 0.263 seconds and 0.301 seconds for [13] and [4] schemes respectively.…”
Section: Defintionmentioning
confidence: 94%
See 3 more Smart Citations
“…The decryption time of our scheme 0.024 regardless the number of attributes in access policy. On another hand, the impact of number of attributes is clear in Figure . 4 for Jin et al [13] and Zhang et al [4] schemes. for example, the execution time of encryption operation when the number of attributes is three is 0.263 seconds and 0.301 seconds for [13] and [4] schemes respectively.…”
Section: Defintionmentioning
confidence: 94%
“…Whereas, the execution time of the decryption operation on DecIn machine is constant. 4 the execution time impact with the number of attributes in all discussed schemes (ours, [13], and [4]). However, its slightly impact in our scheme as the execution time is is 0.114 seconds when the number of attributes is three to and it is is 0.164 seconds when the number of attributes is thirty.…”
Section: Defintionmentioning
confidence: 99%
See 2 more Smart Citations
“…But it is evaluated to be too inefficient to be practically deployed for its cumbersome algorithm structure. On this basis, Zhang et al [31] alleviated the decryption overheads by applying the secure outsourced computing technology, but the system still cannot escape from the complicated algorithm structure. To address this problem, more recently, Ying et al [32] constructed a novel fully policy-hidden ABE scheme with significant efficiency improvements by their designed security-enhanced Attribute Cuckoo Filter.…”
Section: Related Workmentioning
confidence: 99%