E-resources
Peer reviewed
Open access
-
YU Jinxia, YANG Chaochao, ZHANG Qichao, YAN Xixi
Jisuanji kexue yu tansuo, 02/2020, Volume: 14, Issue: 2Journal Article
Attribute-based encryption mechanism is widely used in outsourcing environment because of its charac-teristics of “one-to-many” communication. However, users attributes often change dynamically. In order to solve the problem of attribute revocation in the attribute-based encryption scheme in the outsourcing systems, combined with the attribute-based encryption scheme proposed by Yan et al., a revocable ciphertext-policy attribute-based encryption in data outsourcing systems from lattices is introduced. The scheme uses the LWE (learning with error) problem to construct the encryption and decryption algorithm, which can resist the quantum attack. Tree-access structure is adopted to realize flexible fine-grained access strategy. In addition, with the help of the data outsourcing management server, the attribute key and ciphertext are updated to achieve immediate attribute revocation. The scheme is proven to satisfy the security under the selective attribute and selective plaintext attack. The comparative analysi
Shelf entry
Permalink
- URL:
Impact factor
Access to the JCR database is permitted only to users from Slovenia. Your current IP address is not on the list of IP addresses with access permission, and authentication with the relevant AAI accout is required.
Year | Impact factor | Edition | Category | Classification | ||||
---|---|---|---|---|---|---|---|---|
JCR | SNIP | JCR | SNIP | JCR | SNIP | JCR | SNIP |
Select the library membership card:
If the library membership card is not in the list,
add a new one.
DRS, in which the journal is indexed
Database name | Field | Year |
---|
Links to authors' personal bibliographies | Links to information on researchers in the SICRIS system |
---|
Source: Personal bibliographies
and: SICRIS
The material is available in full text. If you wish to order the material anyway, click the Continue button.