Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates
The emergence of cloud computing enables users to upload data to remote clouds and compute them. This drastically reduces computing and storage costs for users. Considering secure computing for multilevel users in enterprises, the notion of hierarchical identity-based inner product functional encryp...
Saved in:
Main Authors: | Cheng-Yi Lee, Zi-Yuan Liu, Masahiro Mambo, Raylin Tso |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2024-01-01
|
Series: | IET Information Security |
Online Access: | http://dx.doi.org/10.1049/2024/5535196 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Implementation of shared file encrypted storage hierarchical access control scheme
by: Li LI, et al.
Published: (2016-07-01) -
Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain
by: Xuewang ZHANG, et al.
Published: (2022-08-01) -
Privacy enhancement using selective encryption scheme in data outsourcing
by: Long Nguyen-Vu, et al.
Published: (2016-07-01) -
Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption
by: Tao FENG, et al.
Published: (2023-05-01) -
Blockchain-Assisted Hierarchical Attribute-Based Encryption Scheme for Secure Information Sharing in Industrial Internet of Things
by: A. Sasikumar, et al.
Published: (2024-01-01)