Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,085,405 papers from all fields of science
Search
Sign In
Create Free Account
Attribute-based encryption
Known as:
Abe
, Attribute based encryption
Attribute-based encryption is a type of public-key encryption in which the secret key of a user and the ciphertext are dependent upon attributes (e.g…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Broadcast encryption
Cloud computing security
Functional encryption
ID-based encryption
Broader (1)
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2020
Highly Cited
2020
A Novel Approach to View and Modify Data in Cloud Environment Using Attribute-Based Encryption
S. Subbiah
,
S. Palaniappan
,
S. Ashokkumar
,
A. Balasundaram
2020
Corpus ID: 213354953
The Big data and cloud integration is a challenging Task. To enhance the data security issues, ABE can be deployed. In proposed…
Expand
Highly Cited
2017
Highly Cited
2017
Cipher Text Policy Attribute-Based Encryption Supporting Flexible Attributes
Mr. M. D. Ghodeswar
,
D. S. S. Sherekar
,
Dr. V. M. Thakare
2017
Corpus ID: 20018192
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been a very active research area in recent years. Because of two…
Expand
2013
2013
Low Complexity Multi-authority Attribute Based Encryption Scheme for Mobile Cloud Computing
Fei Li
,
Y. Rahulamathavan
,
M. Rajarajan
,
R. Phan
IEEE Seventh International Symposium on Service…
2013
Corpus ID: 9052313
In multi-authority attribute based encryption (MA-ABE) schemes, multiple authorities monitor different set of attributes and the…
Expand
2011
2011
Attribute-Based Key-Insulated Encryption
Jianhong Chen
,
Yongtao Wang
,
Kefei Chen
Journal of information science and engineering
2011
Corpus ID: 11493735
Attribute-based encryption (ABE) is an exciting alternative to public-key encryption, as ABE develops encryption systems with…
Expand
2010
2010
Implementing Attribute-Based Encryption in Web Services
Song Luo
,
Jian-bin Hu
,
Zhong Chen
IEEE International Conference on Web Services
2010
Corpus ID: 3414867
Web services are now widely used in web-based applications. To protect the information in web services, many security…
Expand
2010
2010
Data Sharing on Untrusted Storage with Attribute-Based Encryption
Shucheng Yu
2010
Corpus ID: 86473750
Storing data on untrusted storage makes secure data sharing a challenge issue. On one hand, data access policies should be…
Expand
2009
2009
Dynamic Attributes Design in Attribute Based Encryption
Nanxi Chen
,
M. Gerla
2009
Corpus ID: 5407488
In the past, sending encrypted messages to a group of users is not easy since it requires a shared group key in advance…
Expand
2007
2007
Collusion-Resistant Group Key Management Using Attribute-Based Encryption
Ling Cheung
,
Joseph A. Cooley
,
R. Khazan
,
Calvin C. Newport
IACR Cryptology ePrint Archive
2007
Corpus ID: 18657428
This paper illustrates the use of ciphertext-policy attribute- based encryption (CP-ABE), a recently proposed primitive, in the…
Expand
Highly Cited
2003
Highly Cited
2003
A study on building risk monitoring using wireless sensor network MICA mote
N. Kurata
,
B. Spencer
,
M. Ruiz‐Sandoval
,
Y. Miyamoto
,
Y. Sako
2003
Corpus ID: 41973326
A number of studies have been conducted on structural health monitoring for buildings and civil engineering structures in recent…
Expand
1988
1988
Information and Meta Information
I. Gilboa
Theoretical Aspects of Rationality and Knowledge
1988
Corpus ID: 13554469
A model of information is presented, in which statements such as "the information sets are common knowledge" may be formally…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE