A Survey on Attribute-Based Encryption Schemes of Access Control in Cloud Environments

Download Now
Provided by: International Journal of Network Security
Topic: Cloud
Format: PDF
In Attribute-Based Encryption (ABE) scheme, attributes play a very important role. Attributes have been exploited to generate a public key for encrypting data and have been used as an access policy to control users' access. The access policy can be categorized as either key-policy or ciphertext-policy. The key-policy is the access structure on the user's private key, and the ciphertext-policy is the access structure on the ciphertext. And the access structure can also be categorized as either monotonic or non-monotonic one.
Download Now

Find By Topic