搜索结果: 1-15 共查到“军事学 Policy”相关记录37条 . 查询时间(0.037 秒)
Policy-Based Sanitizable Signatures
Sanitizable Signatures Chameleon-Hashes Digital Signatures
2019/4/23
Sanitizable signatures allow a single, and signer-defined, sanitizer to modify signed messages in a controlled way without invalidating the respective signature. They turned out to be a fascinating pr...
LucidiTEE: Policy-based Fair Computing at Scale
privacy policy fair exchange trusted execution environment
2019/3/1
In light of widespread misuse of personal data, we enable users to control the sharing and use of their data, even when offline, by binding that data to policies. A policy specifies the allowed functi...
A fully distributed revocable ciphertext-policy hierarchical attribute-based encryption without pairing
Cloud computing Hierarchical attribute-based encryption Access control
2018/11/20
Several appealing features of cloud computing such as cost-effectiveness and user-friendliness have made many users and enterprises interested to outsource their sensitive data for sharing via cloud. ...
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification
Attribute-Based Encryption Authorization Classification
2018/11/5
Thanks to the ease of access and low expenses, it is now popular for people to store data in cloud servers. To protect sensitive data from being leaked to the outside, people usually encrypt the data ...
Decentralized Policy-Hiding Attribute-Based Encryption with Receiver Privacy
public-key cryptography attribute-based encryption
2018/8/21
Attribute-based encryption (ABE) enables limiting access to encrypted data to users with certain attributes. Different aspects of ABE were studied, such as the multi-authority setting (MA-ABE), and po...
Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List
public-key cryptography Revocable Attribute-Based Encryption
2018/4/11
In this paper, we propose an efficient revocable Ciphertext-Policy Attribute-Based Encryption (CP-ABE) scheme. We base on the direct revocation approach, by embedding the revocation list into cipherte...
IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication
Group-based Secure Communication Ciphertext-Policy Attribute-Based Encryption ID Revocation
2017/11/20
Ciphertext-Policy Attribute-Based Encryp- tion (CP-ABE) is an access control mechanism over encrypted data and well suited for secure group-based communication. However, it also suffers from the fol- ...
HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing
Attribute-Based Access Control Encryption CP-ABE
2017/11/20
Ciphertext Policy Attribute-Based Encryption (CP- ABE) has been proposed to implement the attribute-based access control model. In CP-ABE, data owners encrypt the data with a certain access policy suc...
Zero-Knowledge Password Policy Check from Lattices
zero-knowledge password policy check set membership proof lattice-based cryptography
2017/9/13
Passwords are ubiquitous and most commonly used to authenticate users when logging into online services. Using high entropy passwords is critical to prevent unauthorized access and password policies e...
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme
lattice-based cryptography attribute-based encryption GPU computing
2017/6/26
In this paper, we report on our implementation of a lattice-based Key-Policy Attribute-Based Encryption (KP-ABE) scheme, which uses short secret keys. The particular KP-ABE scheme can be used directly...
Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption
public-key cryptography attribute-based encryption direct chosen-ciphertext security
2017/5/31
We propose a technique of individually modifying an attribute-based encryption scheme (ABE) that is secure against chosen-plaintext attacks (CPA) into an ABE scheme that is secure against chosen-ciphe...
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms
Attribute-Based Encryption Homomorphic-Policy LSSS
2016/12/7
Attribute-Based Encryption (ABE) allows to target the recipients of a message according
to a policy expressed as a predicate among some attributes. Ciphertext-policy ABE schemes can
choose the polic...
Analysis of a Secure and Verifiable Policy Update Outsourcing Scheme for Big Data Access Control in the Cloud
Access Control Attribute-based Encryption Policy Updating
2016/7/5
How to flexibly change the access policy after the initial data access policy has
been set is a critical problem to promote attribute-based encryption (ABE) from a theoretical
tool to a practical to...
Dynamic Policy Update for Ciphertext-Policy Attribute-Based Encryption
public-key cryptography Ciphertext-policy attribute-based encryption
2016/5/17
Ciphertext-policy attribute-based encryption (CP-ABE) is regarded as a promising cryptographic tool for encrypted access control in public cloud storage systems. However, a problem for CP-ABE schemes ...
Zero-Knowledge Password Policy Checks and Verifier-Based PAKE
Password policies password registration authentication
2016/1/23
Zero-Knowledge Password Policy Checks (ZKPPC), introduced in this work, enable blind registration of client passwords at remote servers, i.e., client passwords are never transmitted to the servers. ...