The information with unique identification of the data owner is embedded in the ciphertext of CP-ABE by paillier homomorphic encryption, and the data can have multiple sharers. No one has access to the plaintext during the whole confirmation process, which reduces the risk of source data leakage.
This paper proposes a new data confirmation method based on ciphertext policy attribute-based encryption (CP-ABE), which is widely used in cloud storage ...
In this paper we propose a new measure of data confirmation based on Ciphertext-Policy Attribute-Base Encryption(CP-ABE).
The traditional CP-ABE scheme cannot meet the needs of right confirmation, so we use the unique identifier of the data owner (which can be an address, ID number ...
Mar 9, 2023 · This paper proposes a new data confirmation method based on ciphertext policy attribute-based encryption (CP-ABE), which is widely used in cloud storage ...
This paper proposes a new measure of data confirmation based on Ciphertext-Policy Attribute-Base Encryption (CP-ABE), where the information with unique ...
The aim of this paper is to assess whether audit may be recognised as the evaluation tool for management systems in terms of their functioning and ensuring ...
People also ask
During the entire confirmation process, third-party organizations cannot access the source data, reducing the risk of source data leakage. Finally, the ...
Mar 29, 2023 · ... scheme to be secure and irreproducible. In order to satisfy the requirement of data confirmation, the conventional CP-ABE scheme is insufficient ...
The CP-ABE scheme empowers data owners to establish their own access policies, effectively granting encryption-based access control to their data with ...
Missing: Auditable | Show results with:Auditable