Track topics on Twitter Track topics that are important to you
With the development of outsourcing data services, data security has become an urgent problem that needs to be solved. Attribute-based encryption is a valid solution to data security in cloud storage. There is no existing scheme that can guarantee the privacy of access structures and achieve attribute-based encryption with keyword search and attribute revocation. In this article, we propose a new searchable and revocable multi-data owner attribute-based encryption scheme with a hidden policy in cloud storage. In the new scheme, the same access policy is used in both the keyword index and message encryption. The advantage of keyword index with access policy is that as long as a user's attributes satisfy the access policy, the searched ciphertext can be correctly decrypted. This property improves the accuracy of the search results. The hidden policy is used in both the ciphertext and the keyword index to protect users' privacy. The new scheme contains attribute revocation, which is suitable for the actual situation that a user's attributes maybe changed over time. In the general bilinear group model, the security of the scheme is demonstrated, and the efficiency of the scheme is analyzed.
This article was published in the following journal.
Name: PloS one
We propose an attribute-based encryption scheme with multi-keyword search and supporting attribute revocation in cloud storage environment, in which binary attributes and AND-gate access policy are us...
In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user may have multiple attributes, and each attribute may be shared simultaneously by many users. The decryption key of an attribut...
Revocation functionality and hierarchy key delegation are two necessary and crucial requirements to identity-based cryptosystems. Revocable hierarchical identity-based encryption (RHIBE) has attracted...
[This corrects the article DOI: 10.1371/journal.pone.0203225.].
Security is the most critical issue amid transmission of medical images because it contains sensitive information of patients. Medical image security is an essential method for secure the sensitive da...
During the last pandemic influenza antivirals were prescribed both as prophylaxis and treatment. However, adherence rates were suboptimal. This study assessed the effect of theory-based an...
This is a non-interventional, multi-country, multi-site study based on existing data from medical records of patients treated with Gi(l)otrif® as part of the routine treatment according t...
Background: Genes tell a person s body how to grow and work. All people have variations in their genes. Some of these cause differences that show up in a person s traits or their health. ...
There have been a number of studies which attribute causality between reflux disease and asthma. In addition, clinicians typically treat chronic asthmatics with high dose acid suppressing...
This is a non-interventional, multi-country, multi-centre cohort study based on existing data from medical records of patients with EGFR mutation-positive advanced NSCLC treated with afati...
Making information permanently non-identifiable that is associated with the identity of specific entities via encryption or other methods.
Information application based on a variety of coding methods to minimize the amount of data to be stored, retrieved, or transmitted. Data compression can be applied to various forms of data, such as images and signals. It is used to reduce costs and increase efficiency in the maintenance of large volumes of data.
The perceived attribute of a sound which corresponds to the physical attribute of intensity.
A multi- and interdisciplinary field concerned with improving health and achieving equity in health for all people. It transcends national boundaries, promotes cooperation and collaboration within and beyond health science fields, and combines population-based disease prevention with individually-based patient care.
Studies which start with the identification of persons with a disease of interest and a control (comparison, referent) group without the disease. The relationship of an attribute to the disease is examined by comparing diseased and non-diseased persons with regard to the frequency or levels of the attribute in each group.