These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
125 related articles for article (PubMed ID: 32946491)
1. A generic construction for revocable identity-based encryption with subset difference methods. Lee K PLoS One; 2020; 15(9):e0239053. PubMed ID: 32946491 [TBL] [Abstract][Full Text] [Related]
2. An efficient and provable secure revocable identity-based encryption scheme. Wang C; Li Y; Xia X; Zheng K PLoS One; 2014; 9(9):e106925. PubMed ID: 25238418 [TBL] [Abstract][Full Text] [Related]
3. Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters. Xing Q; Wang B; Wang X; Tao J PLoS One; 2018; 13(4):e0195204. PubMed ID: 29649326 [TBL] [Abstract][Full Text] [Related]
5. Adaptively Secure Efficient (H)IBE over Ideal Lattice with Short Parameters. Zhang Y; Liu Y; Guo Y; Zheng S; Wang L Entropy (Basel); 2020 Nov; 22(11):. PubMed ID: 33287014 [TBL] [Abstract][Full Text] [Related]
6. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage. Wang S; Gao T; Zhang Y PLoS One; 2018; 13(11):e0206126. PubMed ID: 30383840 [TBL] [Abstract][Full Text] [Related]
7. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage. Wang S; Zhang X; Zhang Y PLoS One; 2016; 11(11):e0167157. PubMed ID: 27898703 [TBL] [Abstract][Full Text] [Related]
8. A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments. Meshram C; Imoize AL; Aljaedi A; Alharbi AR; Jamal SS; Barve SK Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770535 [TBL] [Abstract][Full Text] [Related]
9. A Generic Construction of Integrated Secure-Channel Free PEKS and PKE and its Application to EMRs in Cloud Storage. Suzuki T; Emura K; Ohigashi T J Med Syst; 2019 Mar; 43(5):128. PubMed ID: 30923926 [TBL] [Abstract][Full Text] [Related]
10. A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment. Li J; Peng J; Qiao Z Big Data; 2024 Oct; 12(5):357-366. PubMed ID: 35417273 [TBL] [Abstract][Full Text] [Related]
11. A keyword searchable attribute-based encryption scheme with attribute update for cloud storage. Wang S; Ye J; Zhang Y PLoS One; 2018; 13(5):e0197318. PubMed ID: 29795577 [TBL] [Abstract][Full Text] [Related]
12. Revocable identity-based proxy re-signature against signing key exposure. Yang X; Chen C; Ma T; Wang J; Wang C PLoS One; 2018; 13(3):e0194783. PubMed ID: 29579125 [TBL] [Abstract][Full Text] [Related]
13. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage. Guo L; Yau WC J Med Syst; 2015 Feb; 39(2):11. PubMed ID: 25634700 [TBL] [Abstract][Full Text] [Related]
14. A revocable storage CP-ABE scheme with constant ciphertext length in cloud storage. Zhao Y; Xie X; Zhang X; Ding Y Math Biosci Eng; 2019 May; 16(5):4229-4249. PubMed ID: 31499660 [TBL] [Abstract][Full Text] [Related]
15. Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing. Huang B; Gao J; Li X J Cloud Comput (Heidelb); 2023; 12(1):37. PubMed ID: 36937653 [TBL] [Abstract][Full Text] [Related]
16. Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage. Wang S; Guo K; Zhang Y PLoS One; 2018; 13(9):e0203225. PubMed ID: 30212473 [TBL] [Abstract][Full Text] [Related]
17. Searchable attribute-based encryption scheme with attribute revocation in cloud storage. Wang S; Zhao D; Zhang Y PLoS One; 2017; 12(8):e0183459. PubMed ID: 28859125 [TBL] [Abstract][Full Text] [Related]
18. Secure medical information sharing in cloud computing. Shao Z; Yang B; Zhang W; Zhao Y; Wu Z; Miao M Technol Health Care; 2015; 23 Suppl 1():S133-7. PubMed ID: 26410315 [TBL] [Abstract][Full Text] [Related]
19. Unified Fine-Grained Access Control for Personal Health Records in Cloud Computing. Li W; Liu BM; Liu D; Liu RP; Wang P; Luo S; Ni W IEEE J Biomed Health Inform; 2019 May; 23(3):1278-1289. PubMed ID: 29994490 [TBL] [Abstract][Full Text] [Related]
20. Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage. Wang S; Yao L; Zhang Y PLoS One; 2018; 13(10):e0205675. PubMed ID: 30312345 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]