Learn More
Attribute based proxy re-encryption scheme (ABPRE) is a new cryptographic primitive which extends the traditional proxy re-encryption (public key or identity based cryptosystem) to the attribute based counterpart, and thus empower users with delegating capability in the access control environment. Users, identified by attributes, could freely designate a(More)
This paper is to effectively solve the problem that the objects of traditional plant identification were too broad and the classification features of it were usually not synthetic and the recognition rate was always slightly low. This study gives one recognition approach, in which the shape features and the texture features of the leaves of broad-leaved(More)
Ciphertext policy attribute based encryption (CPABE) allows a sender to distribute messages based on an access policy which can be expressed as a boolean function consisting of (OR, AND) gates between attributes. A receiver whose secret key is associated with those attributes could only decrypt a ciphertext successfully if and only if his attributes satisfy(More)
In this paper, the spectrum efficiency for four scenarios: baseline, cell split, fixed relay and dedicated mobile relay on vehicle are analyzed and compared in terms of unified spectrum efficiency bps/Hz/km2. The theoretical expression is derived and the capacity is calculated by numerical integration based on the parameters for 3GPP LTE-Advanced system.(More)
An attribute based encryption scheme (ABE) is a cryptographic primitive in which every user is identified by a set of attributes, and some function of these attributes is used to determine the ability to decrypt each ciphertext. Chase proposed the first multi authority ABE scheme in TCC 2007 as an answer to an open problem presented by Sahai and Waters in(More)
Cloud-assisted mobile health (mHealth) monitoring, which applies the prevailing mobile communications and cloud computing technologies to provide feedback decision support, has been considered as a revolutionary approach to improving the quality of healthcare service while lowering the healthcare cost. Unfortunately, it also poses a serious risk on both(More)
—In distributed collaborative networks such as peer-to-peer systems and wireless ad hoc networks, secure communications , information sharing and dissemination heavily depend on effective trust management. Recently, trust based encryption (TBE) has been proposed to deal with secure information sharing and dissemination for such networks. Unfortunately, the(More)