191 related articles for article (PubMed ID: 37177384)
1. Backward Compatible Identity-Based Encryption.
Kim J
Sensors (Basel); 2023 Apr; 23(9):. PubMed ID: 37177384
[TBL] [Abstract][Full Text] [Related]
2. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.
Xiao M; Zhou J; Liu X; Jiang M
Sensors (Basel); 2017 Jun; 17(6):. PubMed ID: 28629131
[TBL] [Abstract][Full Text] [Related]
3. (Inner-Product) Functional Encryption with Updatable Ciphertexts.
Cini V; Ramacher S; Slamanig D; Striecks C; Tairi E
J Cryptol; 2024; 37(1):8. PubMed ID: 38274003
[TBL] [Abstract][Full Text] [Related]
4. A keyword searchable attribute-based encryption scheme with attribute update for cloud storage.
Wang S; Ye J; Zhang Y
PLoS One; 2018; 13(5):e0197318. PubMed ID: 29795577
[TBL] [Abstract][Full Text] [Related]
5. Analysis of an ABE Scheme with Verifiable Outsourced Decryption.
Liao Y; He Y; Li F; Jiang S; Zhou S
Sensors (Basel); 2018 Jan; 18(1):. PubMed ID: 29320418
[TBL] [Abstract][Full Text] [Related]
6. A Provably Secure IBE Transformation Model for PKC Using Conformable Chebyshev Chaotic Maps under Human-Centered IoT Environments.
Meshram C; Imoize AL; Aljaedi A; Alharbi AR; Jamal SS; Barve SK
Sensors (Basel); 2021 Oct; 21(21):. PubMed ID: 34770535
[TBL] [Abstract][Full Text] [Related]
7. Attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage.
Wang S; Yao L; Zhang Y
PLoS One; 2018; 13(10):e0205675. PubMed ID: 30312345
[TBL] [Abstract][Full Text] [Related]
8. Hybrid Technique for Cyber-Physical Security in Cloud-Based Smart Industries.
Garg D; Rani S; Herencsar N; Verma S; Wozniak M; Ijaz MF
Sensors (Basel); 2022 Jun; 22(12):. PubMed ID: 35746411
[TBL] [Abstract][Full Text] [Related]
9. A Study on CP-ABE-based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment.
Hwang YW; Lee IY
Sensors (Basel); 2020 Aug; 20(17):. PubMed ID: 32878202
[TBL] [Abstract][Full Text] [Related]
10. Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing.
Huang B; Gao J; Li X
J Cloud Comput (Heidelb); 2023; 12(1):37. PubMed ID: 36937653
[TBL] [Abstract][Full Text] [Related]
11. Traceable ciphertext-policy attribute-based encryption scheme with attribute level user revocation for cloud storage.
Wang S; Guo K; Zhang Y
PLoS One; 2018; 13(9):e0203225. PubMed ID: 30212473
[TBL] [Abstract][Full Text] [Related]
12. A generic construction for revocable identity-based encryption with subset difference methods.
Lee K
PLoS One; 2020; 15(9):e0239053. PubMed ID: 32946491
[TBL] [Abstract][Full Text] [Related]
13. A revocable storage CP-ABE scheme with constant ciphertext length in cloud storage.
Zhao Y; Xie X; Zhang X; Ding Y
Math Biosci Eng; 2019 May; 16(5):4229-4249. PubMed ID: 31499660
[TBL] [Abstract][Full Text] [Related]
14. Identity-Based Encryption with Filtered Equality Test for Smart City Applications.
Ming Y; Wang E
Sensors (Basel); 2019 Jul; 19(14):. PubMed ID: 31295922
[TBL] [Abstract][Full Text] [Related]
15. Searchable and revocable multi-data owner attribute-based encryption scheme with hidden policy in cloud storage.
Wang S; Gao T; Zhang Y
PLoS One; 2018; 13(11):e0206126. PubMed ID: 30383840
[TBL] [Abstract][Full Text] [Related]
16. A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment.
Li J; Peng J; Qiao Z
Big Data; 2022 Apr; ():. PubMed ID: 35417273
[TBL] [Abstract][Full Text] [Related]
17. A revocable attribute-based encryption EHR sharing scheme with multiple authorities in blockchain.
Yang X; Li W; Fan K
Peer Peer Netw Appl; 2023; 16(1):107-125. PubMed ID: 36188111
[TBL] [Abstract][Full Text] [Related]
18. A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain.
Obour Agyekum KO; Xia Q; Sifah EB; Gao J; Xia H; Du X; Guizani M
Sensors (Basel); 2019 Mar; 19(5):. PubMed ID: 30862110
[TBL] [Abstract][Full Text] [Related]
19. Adaptively Secure Efficient (H)IBE over Ideal Lattice with Short Parameters.
Zhang Y; Liu Y; Guo Y; Zheng S; Wang L
Entropy (Basel); 2020 Nov; 22(11):. PubMed ID: 33287014
[TBL] [Abstract][Full Text] [Related]
20. Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation.
Lin HY; Tsai TT; Ting PY; Fan YR
Sensors (Basel); 2023 Mar; 23(5):. PubMed ID: 36904909
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]