Efficient attribute-based encryption with attribute revocation for assured data deletion
DOI10.1016/J.INS.2018.02.015zbMATH Open1443.68056OpenAlexW2793588429WikidataQ122949773 ScholiaQ122949773MaRDI QIDQ2004758FDOQ2004758
Authors: Liang Xue, Yong Yu, Man Ho Au, Xiaojiang Du, Bo Yang, Yannan Li
Publication date: 7 October 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2018.02.015
Recommendations
- scientific article; zbMATH DE number 7108943
- Attribute-based encryption optimized for cloud computing
- Research on ciphertext-policy attribute-based encryption with attribute level user revocation in cloud storage
- Towards revocable fine-grained encryption of cloud data: reducing trust upon cloud
- Proof of erasability for ensuring comprehensive data deletion in cloud computing
Information storage and retrieval of data (68P20) Data encryption (aspects in computer science) (68P25) Internet topics (68M11)
Cites Work
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Fuzzy Identity-Based Encryption
- Compact Proofs of Retrievability
- Intelligent cryptography approach for secure distributed big data storage in cloud computing
- Efficient Proofs of Secure Erasure
- Proofs of space: when space is of the essence
Cited In (9)
- Publicly verifiable data transfer and deletion scheme for cloud storage
- A key-sharing based secure deduplication scheme in cloud storage
- Privacy-preserving subgraph matching protocol for two parties
- A secure cloud backup system with deduplication and assured deletion
- Proof of erasability for ensuring comprehensive data deletion in cloud computing
- Achieving privacy-preserving sensitive attributes for large universe based on private set intersection
- Forward and backward secure keyword search with flexible keyword shielding
- Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks
- A secure ciphertext self-destruction scheme with attribute-based encryption
This page was built for publication: Efficient attribute-based encryption with attribute revocation for assured data deletion
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2004758)