Loading…
A Study On Ciphertext Policy Attribute Based Encryption
In many cyber-physical systems, including the Internet of Things, attribute-based encryption and ciphertext policy (CP-ABE) are frequently employed to provide data security and secure cloud computing. Both policy-based ciphertext encryption and policy-based key-based encryption are different types o...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | In many cyber-physical systems, including the Internet of Things, attribute-based encryption and ciphertext policy (CP-ABE) are frequently employed to provide data security and secure cloud computing. Both policy-based ciphertext encryption and policy-based key-based encryption are different types of encryptions. We generate the key in KP-ABE using a policy that takes the qualities into consideration. And to access the offered properties, CP-ABE employs a tree structure. The encryptor can change the policy governing who is permitted to decrypt the encrypted communication in a Ciphertext Policy Attribute-based Encryption system. A characteristic-based policy can be developed. Along with the access policy, the ciphertext in CP-ABE is transmitted. To protect the identity of the encryptor, we offer a solution that does not need sharing the access policy along with the ciphertext. Even if the storage server is unreliable, encrypted data may be kept private using our approaches since they are secure against collusion assaults. |
---|---|
ISSN: | 2575-7288 |
DOI: | 10.1109/ICACCS57279.2023.10113095 |