,Generic attribute revocation systems for attribute-based encryption in cloud storage

来源 :信息与电子工程前沿(英文版) | 被引量 : 0次 | 上传用户:leonontop
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Attribute-based encryption (ABE) has been a preferred encryption technology to solve the problems of data protection and access control, especially when the cloud storage is provided by third-party service providers. ABE can put data access under control at each data item level. However, ABE schemes have practical limitations on dynamic attribute revocation. We propose a generic attribute revocation system for ABE with user privacy protection. The attribute revocation ABE (AR-ABE) system can work with any type of ABE scheme to dynamically revoke any number of attributes.
其他文献
本研究选用我国北方冬麦区的主栽品种、高代品系和国外抗源共计88份,于1999-00和2000-01年度研究了小麦白粉病的苗期抗性和成株期抗性。苗期选用20个白粉菌株,21个鉴别寄主,根据
Biological neurons can receive inputs and capture a variety of exteal stimuli, which can be encoded and transmitted as different electric signals. Thus, the mem
Lower-limb assisted exoskeletons are widely researched for movement assistance or rehabilitation training. Due to advantages of compliance with human body and l
电台的新闻,是传播信息的重要途径。信息容量越大,对听众的吸引力就越大,实际发挥的作用也越大。在广播的新闻节目中,一些省台与中央台相比,有不少差距,最突出的是新闻的信
Hash-based message authentication code (HMAC) is widely used in authentication and message integrity. As a Chinese hash algorithm, the SM3 algorithm is graduall
We study the balance problem caused by forward leaning of the wearer’s upper body during rehabilitation training with a lower limb rehabilitation exoskeleton.
拓宽种质基础对玉米育种水平的进一步提高具有重要意义。挖掘地方优良种质,及时鉴定和评价所收集和改良的种质,明确这些种质之间的遗传关系,探索新的杂种优势模式则是拓宽种质资源的关键所在。本研究以8个群体为材料,按照双列杂交设计组配成28个组合,将所组配组合材料在郑州、西华两地采用完全随机区组设计安排试验,同时以分属于不同玉米优势群的骨干自交系为材料对金皇后综合种测交,并组配15个组合材料,在海南乐东县九
目前在三系杂交稻中85%以上的不育细胞质是野生稻细胞质,单一细胞质源的大面积应用不仅制约着杂交稻单产的进一步提高,而且有可能导致对单一细胞质敏感病害的大流行。细胞质利用的多源化是解决这一问题的关键之一。我们以杂交籼稻常用的5种细胞质的不育系与相应的保持系交叉配组,配制20个二元不育系,然后与9311、抗65、特青3个恢复系配组,配制了60个三交F_1,并用6个不同类型的不育系与不同细胞质的同质恢复
Elliptic curve cryptography has been used in many security systems due to its small key size and high security compared with other cryptosystems. In many well-k
以海域使用现状调查省级成果数据为基础,通过对海岛周边海域使用现状分析,阐述我国海岛周边海域空间资源开发与利用状况,及开发过程中出现的诸如海岛消失、生态环境恶化、海