Track topics on Twitter Track topics that are important to you
We propose an attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage environment, in which binary attributes and AND-gate access policy are used. Our proposal enjoys several advantages. Firstly, multi-keyword search is available, and only when a data user's attribute set satisfies access policy in keyword index, and keyword token generated by data user matches index successfully, then data user can obtain ciphertext containing keywords. In this way, more accurate keyword search is achievable. Secondly, the search privacy of data user is protected owing to cloud servers cannot obtain any knowledge of keywords which data user is interested in. Meanwhile, the ciphertext is able to be decrypted when data user's attribute set satisfies access policy specified in the ciphertext, which can both improve security of encryption and achieve secure fine-grained access control. Thirdly, the proposed scheme supports attribute revocation, in our scheme when a data user's attribute is revoked, the version number of attribute, non-revoked data users' secret keys and related ciphertexts will be updated, such that data user whose attribute is revoked does not decrypt updated ciphertext anymore. In addition, based on the assumption of decisional linear (DL) and decisional Diffie-Hellman (DDH), our scheme is proved to be secure against selectively chosen-keyword attacks and selectively chosen-plaintext attacks respectively, and it also ensures token privacy security.
This article was published in the following journal.
Name: PloS one
With the development of outsourcing data services, data security has become an urgent problem that needs to be solved. Attribute-based encryption is a valid solution to data security in cloud storage....
Fog computing can extend cloud computing to the edge of the network so as to reduce latency and network congestion. However, existing encryption schemes were rarely used in fog environment, resulting ...
In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user may have multiple attributes, and each attribute may be shared simultaneously by many users. The decryption key of an attribut...
[This corrects the article DOI: 10.1371/journal.pone.0203225.].
The sharing of patients' locations is an important part in mobile medical services and modern smart healthcare. Although location sharing based on blockchains has advantages on decentralization and op...
The study will evaluate the effectiveness of a co-developed exercise referral scheme. Participants will be recruited to one of three groups 1. Co-developed exercise referral scheme, 2. Usu...
During the last pandemic influenza antivirals were prescribed both as prophylaxis and treatment. However, adherence rates were suboptimal. This study assessed the effect of theory-based an...
The government of Burundi is implementing a new financing scheme in health centres. The objective is to provide additional financial compensations to health centres on the basis of their p...
This study aims to describe in depth the CNS, CNS HIV reservoir and CNS viral rebound in consenting SEARCH 019 subjects prior to, during and after the SEARCH 019 study intervention (VHM + ...
The aim of this study is to investigate whether an incentive scheme is a feasible approach to increase walking/cycling to school.
The perceived attribute of a sound which corresponds to the physical attribute of intensity.
A scheme which provides reimbursement for the health services rendered, generally by an institution, and which provides added financial rewards if certain conditions are met. Such a scheme is intended to promote and reward increased efficiency and cost containment, with better care, or at least without adverse effect on the quality of the care rendered.
A multi- and interdisciplinary field concerned with improving health and achieving equity in health for all people. It transcends national boundaries, promotes cooperation and collaboration within and beyond health science fields, and combines population-based disease prevention with individually-based patient care.
Studies which start with the identification of persons with a disease of interest and a control (comparison, referent) group without the disease. The relationship of an attribute to the disease is examined by comparing diseased and non-diseased persons with regard to the frequency or levels of the attribute in each group.
Making information permanently non-identifiable that is associated with the identity of specific entities via encryption or other methods.