A Cryptographic Access Control Scheme Providing with Fully Homomorphic Encryption

2016 ◽  
Vol 13 (4) ◽  
pp. 2433-2438
Author(s):  
Tonghao Yang ◽  
Junquan Li ◽  
Bin Yu
2013 ◽  
Vol 13 (3) ◽  
pp. 77-90
Author(s):  
Shan-Shan Tu ◽  
Shao-Zhang Niu ◽  
Meng-Jiao Li

Abstract In order to keep the confidential data in the cloud against unauthorized parties, a cryptographic access control solution based on Attribute-Based Encryption (ABE) and Identity-Based Signature (IBS) is introduced in this paper. Under the premise that cloud service provider is untrustful, the proposed scheme can ensure the data security of the cloud storage system in an open environment, as well as reduce the complexity of management. Analysis and experimental results show that the scheme can be semantically secure against adaptive chosen ciphertext attacks under the random oracle model. Our concrete access control scheme can enhance the efficiency of the cloud to a certain extent.


2021 ◽  
Author(s):  
Hongliang Tian ◽  
Xiaonan Ge ◽  
Jiayue Wang ◽  
Chenxi Li

Abstract With the dramatically increasing deployment of intelligent devices, the Internet of Things (IoT) has attracted more attention and developed rapidly. It effectively collects and shares data from the surrounding environment to achieve better IoT services. For data sharing, the publish-subscribe (PS) paradigm provides a loosely-coupled and scalable communication model. However, due to the loosely-coupled nature, it is vulnerable to many attacks, resulting in some security threats to the IoT system, but it cannot provide the basic security mechanisms such as authentication and confidentiality to ensure the data security. Thus, in order to protect the system security and users’ privacy, this paper presents a secure blockchain based privacy-preserving access control scheme for PS system, which adopt the fully homomorphic encryption (FHE) to ensure the confidentiality of the publishing events, and leverage the ledger to store the large volume of data events and access cross-domain information. Finally, we analyze the correctness and security of our scheme, moreover, we deploy our proposed prototype system on two computers, and evaluate its performance. The experimental results show that our PS system can efficiently achieve the equilibrium between the system cost and the security requirement.


2020 ◽  
Author(s):  
Megha Kolhekar ◽  
Ashish Pandey ◽  
Ayushi Raina ◽  
Rijin Thomas ◽  
Vaibhav Tiwari ◽  
...  

Author(s):  
Asmidar Abu Bakar ◽  
Roslan Ismail ◽  
Abdul Rahim Ahmad ◽  
Jamalul-lail Abdul Manan ◽  
Jamilin Jais

2021 ◽  
Author(s):  
Mostefa Kara ◽  
Abdelkader Laouid ◽  
Mohammed Amine Yagoub ◽  
Reinhardt Euler ◽  
Saci Medileh ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document