2020
DOI: 10.1109/tsc.2017.2682090
|View full text |Cite
|
Sign up to set email alerts
|

TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 48 publications
(16 citation statements)
references
References 34 publications
0
16
0
Order By: Relevance
“…Although the scheme eliminates much of work for data owner, it brings extra overhead for authority. Recently, the work in [12] proposes a time-sensitive CP-ABE scheme with high efficiency and fine-grained access control.…”
Section: Hierarchical Abe and Time-release Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Although the scheme eliminates much of work for data owner, it brings extra overhead for authority. Recently, the work in [12] proposes a time-sensitive CP-ABE scheme with high efficiency and fine-grained access control.…”
Section: Hierarchical Abe and Time-release Encryptionmentioning
confidence: 99%
“…Although these days, the authors in [11] have solved the issues of hierarchical users with compound key structure in CP-ABE by combining the scheme of HIBE and ASBE, and the scheme in [12] proposed a time-based ABE by introducing time-releasing encryption (TRE) into CP-ABE. However, these schemes cannot support user dynamicity.…”
Section: Introductionmentioning
confidence: 99%
“…The factor of time was introduced to realize time-release encryption. 6,15 In some existing studies, [16][17][18][19] user revocation was supported in their CP-ABE schemes. In studies by Ning et al, 20,21 illegitimate access could be traced.…”
Section: R1mentioning
confidence: 99%
“…But with the changing of the time periods, it needs to re-encrypt the same data into different versions. Hong et al [35] designed an access control scheme based on both time and attributes. If an attribute has a time restriction, the cloud obtains a token and updates the ciphertext online at the beginning of the time period.…”
Section: Related Workmentioning
confidence: 99%