Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
outsourced decryption
biblio
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT
Submitted by grigby1 on Tue, 04/19/2022 - 3:42pm
Ciphertext Policy ABE
Communication channels
Computational modeling
Costs
CP-ABE
encryption
information security
Internet of Things
outsourced decryption
outsourcing
Pairing-Free
policy-based governance
pubcrawl
revocation
Scalability
standards
biblio
O3-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System
Submitted by grigby1 on Tue, 04/19/2022 - 3:41pm
Chameleon hash function
cloud-assisted Internet of Medical Things (IoMT)
Cloud Computing
CP-ABE
Ecosystems
encryption
Internet of Things
Medical services
online/offline attribute-based encryption (ABE)
outsourced decryption
policy-based governance
pubcrawl
revocation
Scalability
Servers
Telecommunications
biblio
Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
resilience
modified decryption outsourcing mode
OD-ABE scheme
outsourced decryption
outsourcing
private key cryptography
pubcrawl
public key cryptography
public transformation key
Metrics
Resiliency
security model
selective security model
shorter bit length
standards
underlying ABE scheme
underlying standard ABE
ABE ciphertext
generic construction
generic approach
faster decryption time
encryption
efficient transformation key generation algorithm
concrete constructions
composability
Cloud Computing
black-box way
black box encryption
authorisation
attribute-based encryption
adaptive security
Adaptation models
ABE outsourcing schemes
biblio
Multi-Authority Attribute-Based Encryption for Resource-Constrained Users in Edge Computing
Submitted by aekwall on Mon, 08/17/2020 - 10:41am
Computational modeling
outsourced decryption
Online/Offline Encryption
multiauthority attribute-based encryption
Multi-Authority Attribute-Based Encryption
MA-ABE schemes
large-universe MA-CP-ABE scheme
ciphertext pool
encryption algorithm
Performance analysis
fine-grained access control
edge computing
IoT
policy-based governance
pubcrawl
Human behavior
Internet of Things
attribute-based encryption
data privacy
Access Control
encryption
Cryptography
authorisation
Scalability