391
Views
41
CrossRef citations to date
0
Altmetric
Section A

Multi-authority attribute-based encryption with honest-but-curious central authority

, , &
Pages 268-283 | Received 13 Sep 2010, Accepted 22 Dec 2010, Published online: 03 Jun 2011

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (1)

Jesus Vigo-Aguiar, Juan Carlos Reboredo & Higinio Ramos Calle. (2012) Topics of contemporary computational mathematics. International Journal of Computer Mathematics 89:3, pages 265-267.
Read now

Articles from other publishers (40)

Redwan Walid, Karuna Pande Joshi & Seung Geol Choi. (2024) Comparison of attribute-based encryption schemes in securing healthcare systems. Scientific Reports 14:1.
Crossref
Leyou Zhang, Xinmin Li, Qing Wu & Fatemeh Rezaeibagha. (2024) Blockchain-Aided Anonymous Traceable and Revocable Access Control Scheme With Dynamic Policy Updating for the Cloud IoT. IEEE Internet of Things Journal 11:1, pages 526-542.
Crossref
Xingdong Liu, Hui Zhu, Fengwei Wang, Yandong Zheng & Zhe Liu. (2023) Efficient and Privacy-Preserving Neural Network Prediction Scheme with TEE. Efficient and Privacy-Preserving Neural Network Prediction Scheme with TEE.
Hiral S. Trivedi & Sankita J. Patel. (2022) Dynamically scalable privacy-preserving authentication protocol for distributed IoT based healthcare service providers. Wireless Networks 29:3, pages 1385-1409.
Crossref
Karthikeyan Kaliyaperumal, N. Kannaiya Raja, L. Velmurugan & Bacha Uma Woyessa. (2023) Securing the Health Care Data Using Hybrid Rabin and Routing Algorithm. Securing the Health Care Data Using Hybrid Rabin and Routing Algorithm.
Nishant Doshi. (2022) A novel traceability approach in IoT paradigm for CP-ABE proxy re-encryption. Sādhanā 47:4.
Crossref
Cong Li, Qingni Shen, Zhikang Xie, Jisheng Dong, Xinyu Feng, Yuejian Fang & Zhonghai Wu. (2022) Hierarchical and non-monotonic key-policy attribute-based encryption and its application. Information Sciences 611, pages 591-627.
Crossref
Jasone Astorga, Marc Barcelo, Aitor Urbieta & Eduardo Jacob. (2022) Revisiting the Feasibility of Public Key Cryptography in Light of IIoT Communications. Sensors 22:7, pages 2561.
Crossref
Sana Belguith, Nesrine Kaaniche & Mohammad Hammoudeh. (2019) Analysis of attribute‐based cryptographic techniques and their application to protect cloud services. Transactions on Emerging Telecommunications Technologies 33:3.
Crossref
Yuping Yan & Péter Ligeti. 2022. Recent Innovations in Computing. Recent Innovations in Computing 767 778 .
Yiming Hei, Jianwei Liu, Hanwen Feng, Dawei Li, Yizhong Liu & Qianhong Wu. (2021) Making MA-ABE fully accountable: A blockchain-based approach for secure digital right management. Computer Networks 191, pages 108029.
Crossref
Suhui Liu, Jiguo Yu, Chunqiang Hu & Mengmeng Li. (2021) Traceable Multiauthority Attribute-Based Encryption with Outsourced Decryption and Hidden Policy for CIoT. Wireless Communications and Mobile Computing 2021, pages 1-16.
Crossref
Heng He, Liang-han Zheng, Peng Li, Li Deng, Li Huang & Xiang Chen. (2020) An efficient attribute-based hierarchical data access control scheme in cloud computing. Human-centric Computing and Information Sciences 10:1.
Crossref
Hiral S. Trivedi & Sankita J. Patel. (2020) Design of secure authentication protocol for dynamic user addition in distributed Internet-of-Things. Computer Networks 178, pages 107335.
Crossref
Yuping Yan, Mohammed B. M. Kamel & Peter Ligeti. (2020) Attribute-based Encryption in Cloud Computing Environment. Attribute-based Encryption in Cloud Computing Environment.
Guocheng Liao, Xu Chen & Jianwei Huang. (2020) Social-Aware Privacy-Preserving Mechanism for Correlated Data. IEEE/ACM Transactions on Networking 28:4, pages 1671-1683.
Crossref
Ehsan Meamari, Hao Guo, Chien-Chung Shen & Rui Zhang. (2020) Data User-Based Attribute Based Encryption. Data User-Based Attribute Based Encryption.
Wanli Xue, Dinusha Vatsalan, Wen Hu & Aruna Seneviratne. (2020) Sequence Data Matching and Beyond: New Privacy-Preserving Primitives Based on Bloom Filters. IEEE Transactions on Information Forensics and Security 15, pages 2973-2987.
Crossref
J. Joshua Daniel Raj, Karthik. P & J. Samson Immanuel. (2020) Simplified Ciphertext Policy Attribute Based Encryption for Multimedia Applications. Procedia Computer Science 171, pages 2713-2719.
Crossref
Suhui Liu, Jiguo Yu, Chunqiang Hu & Mengmeng Li. 2020. Wireless Algorithms, Systems, and Applications. Wireless Algorithms, Systems, and Applications 322 332 .
Hua Dai, Yan Ji, Fu Xiao, Geng Yang, Xun Yi & Lei Chen. (2019) Privacy-Preserving MAX/MIN Query Processing for WSN -as-a -Service. Privacy-Preserving MAX/MIN Query Processing for WSN -as-a -Service.
Fara Jamal, Mohd Taufik Abdullah, Zurina Mohd Hanapi & Azizol Abdullah. (2019) Reliable Access Control for Mobile Cloud Computing (MCC) With Cache-Aware Scheduling. IEEE Access 7, pages 165155-165165.
Crossref
Kennedy Edemacu, Hung Kook Park, Beakcheol Jang & Jong Wook Kim. (2019) Privacy Provision in Collaborative Ehealth With Attribute-Based Encryption: Survey, Challenges and Future Directions. IEEE Access 7, pages 89614-89636.
Crossref
Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai & Rabah Attia. (2018) PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT. Computer Networks 133, pages 141-156.
Crossref
Fang Qi, Ke Li & Zhe Tang. (2017) A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy. A Multi-Authority Attribute-Based Encryption Scheme with Attribute Hierarchy.
Xiao-long Xu, Qi-tong Zhang & Jing-lan Zhou. (2017) NC-MACPABE: Non-centered multi-authority proxy re-encryption based on CP-ABE for cloud storage systems. Journal of Central South University 24:4, pages 807-818.
Crossref
Nishant Doshi & Devesh C. Jinwala. (2016) A novel approach for privacy homomorphism using attribute‐based encryption. Security and Communication Networks 9:17, pages 4451-4467.
Crossref
Tao Li, Rui Zhang & Yanchao Zhang. (2016) PriExpress: Privacy-preserving express delivery with fine-grained attribute-based access control. PriExpress: Privacy-preserving express delivery with fine-grained attribute-based access control.
Hua Dai, Tianyi Wei, Yue Huang, Jia Xu & Geng Yang. (2016) Random Secure Comparator Selection Based Privacy-Preserving MAX/MIN Query Processing in Two-Tiered Sensor Networks. Journal of Sensors 2016, pages 1-13.
Crossref
Josef Spillner, Martin Beck, Alexander Schill & Thomas Michael Bohnert. (2015) Stealth Databases: Ensuring User-Controlled Queries in Untrusted Cloud Environments. Stealth Databases: Ensuring User-Controlled Queries in Untrusted Cloud Environments.
Daya Sagar Gupta & G. P. Biswas. (2015) Identity-Based/Attribute-Based cryptosystem using threshold value without Shamir's Secret Sharing. Identity-Based/Attribute-Based cryptosystem using threshold value without Shamir's Secret Sharing.
Yu Jin, Chuan Tian, Heng He & Fan Wang. (2015) A Secure and Lightweight Data Access Control Scheme for Mobile Cloud Computing. A Secure and Lightweight Data Access Control Scheme for Mobile Cloud Computing.
Taeho Jung, Xiang-Yang Li, Zhiguo Wan & Meng Wan. (2015) Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption. IEEE Transactions on Information Forensics and Security 10:1, pages 190-199.
Crossref
Nishant Doshi & Devesh C. Jinwala. (2013) Fully secure ciphertext policy attribute‐based encryption with constant length ciphertext and faster decryption. Security and Communication Networks 7:11, pages 1988-2002.
Crossref
Chun-I Fan, Vincent Shi-Ming Huang & He-Ming Ruan. (2014) Arbitrary-State Attribute-Based Encryption with Dynamic Membership. IEEE Transactions on Computers 63:8, pages 1951-1961.
Crossref
Zhi Qiao, Shuwen Liang, Spencer Davis & Hai Jiang. (2014) Survey of attribute based encryption. Survey of attribute based encryption.
Shunsuke AOKI & Kaoru SEZAKI. (2014) Negative Surveys with Randomized Response Techniques for Privacy-Aware Participatory Sensing. IEICE Transactions on Communications E97.B:4, pages 721-729.
Crossref
Liaojun Pang, Jie Yang & Zhengtao Jiang. (2014) A Survey of Research Progress and Development Tendency of Attribute-Based Encryption. The Scientific World Journal 2014, pages 1-13.
Crossref
Xuejiao Liu, Yingjie Xia, Shasha Jiang, Fubiao Xia & Yanbo Wang. (2013) Hierarchical Attribute-Based Access Control with Authentication for Outsourced Data in Cloud Computing. Hierarchical Attribute-Based Access Control with Authentication for Outsourced Data in Cloud Computing.
Dr. Karthikeyan Kaliyaperumal, Dr. C. Suresh Gnana Dhas & Mrs. F. Sammy. (2020) Secure Health Care Data Transmission and Prevention Based on Hybrid Robin Public Key Signature Algorithm. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.