• All Solutions All Solutions Caret
    • Editage

      One platform for all researcher needs

    • Paperpal

      AI-powered academic writing assistant

    • R Discovery

      Your #1 AI companion for literature search

    • Mind the Graph

      AI tool for graphics, illustrations, and artwork

    • Journal finder

      AI-powered journal recommender

    Unlock unlimited use of all AI tools with the Editage Plus membership.

    Explore Editage Plus
  • Support All Solutions Support
    discovery@researcher.life
Discovery Logo
Paper
Search Paper
Cancel
Ask R Discovery Chat PDF
Explore

Feature

  • menu top paper My Feed
  • library Library
  • translate papers linkAsk R Discovery
  • chat pdf header iconChat PDF
  • audio papers link Audio Papers
  • translate papers link Paper Translation
  • chrome extension Chrome Extension

Content Type

  • preprints Preprints
  • conference papers Conference Papers
  • journal articles Journal Articles

More

  • resources areas Research Areas
  • topics Topics
  • resources Resources

Outsourced Decryption Research Articles

  • Share Topic
  • Share on Facebook
  • Share on Twitter
  • Share on Mail
  • Share on SimilarCopy to clipboard
Follow Topic R Discovery
By following a topic, you will receive articles in your feed and get email alerts on round-ups.
Overview
143 Articles

Published in last 50 years

Related Topics

  • Attribute-based Encryption Scheme
  • Attribute-based Encryption Scheme
  • Outsourced Data
  • Outsourced Data
  • Searchable Encryption
  • Searchable Encryption
  • Proxy Re-encryption
  • Proxy Re-encryption
  • Attribute-based Encryption
  • Attribute-based Encryption
  • Re-encryption Scheme
  • Re-encryption Scheme

Articles published on Outsourced Decryption

Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
143 Search results
Sort by
Recency
Secure medical data sharing with verifiable outsourced decryption and cryptographic reverse firewalls

Secure medical data sharing with verifiable outsourced decryption and cryptographic reverse firewalls

Read full abstract
  • Journal IconJournal of Information Security and Applications
  • Publication Date IconMay 1, 2025
  • Author Icon Xin Liu + 4
Cite IconCite
Chat PDF IconChat PDF
Save

Privacy-preserving revocable access control for LLM-driven electrical distributed systems

Large Language Models (LLMs) have become transformative tools in natural language processing, significantly advancing the fields of communication, information analysis, and knowledge sharing. However, the vast amounts of sensitive data they handle pose significant challenges for data security and privacy. Traditional cryptographic methods face limitations in efficiently managing access control in LLM-driven electrical distributed systems. This paper introduces a novel Privacy-preserving Revocable Access Control for LLM-driven electrical distributed systems, addressing key concerns such as access policy concealment, user revocation efficiency, and computational overhead. Leveraging an inner-product-based access control mechanism, the proposed scheme achieves complete access policy concealment while supporting flexible access control with wildcard capabilities. Additionally, it facilitates efficient user revocation without requiring costly updates to ciphertexts in such an LLM-driven electrical distributed system. The concise algorithmic structure ensures high efficiency, further enhanced through online/offline encryption and outsourced decryption mechanisms.

Read full abstract
  • Journal IconPeer-to-Peer Networking and Applications
  • Publication Date IconApr 15, 2025
  • Author Icon Peng Xiao + 4
Open Access Icon Open Access
Cite IconCite
Chat PDF IconChat PDF
Save

Intelligent Review Mechanism for Legal Compliance in Public Security Forensic System Based on Blockchain Technology

The legal positioning of blockchain technology applied to evidence and its attributes are the basis for its evidence review and rule design. This paper starts from analyzing the evidence attributes of blockchain electronic data, combines relevant regulations and judicial interpretations, and clarifies the legal effect of blockchain electronic data. Combined with the judicial application of blockchain evidence at home and abroad, it points out the specialized review rules of blockchain evidence. Obtain the blockchain access evidence process, and propose the block file storage method based on RS code as well as the decryption outsourcing attribute-based encryption scheme with the same sub-policy to improve the CP-ABE encryption scheme. Explore the rules for blockchain deposits and clarify the rules and institutional value of blockchain deposits for admissibility. Analyze the theoretical and practical operational performance of the improved attribute-based encryption algorithm. Optimize the evidence storage capacity of blockchain, and analyze the performance of the blockchain technology scheme designed in this paper in the intelligent review of access evidence. In the forensic scenario run by the algorithm in this paper, the stored evidence data is reduced by 1417 characters, the transaction response time is shortened by 175.361ms on average, and the block size is reduced by about 4 times. It proves that the blockchain algorithm scheme proposed in this paper can shrink the cost of depositing evidence, reduce the time of depositing evidence, and improve the efficiency of depositing evidence in the public security forensic system.

Read full abstract
  • Journal IconJournal of Combinatorial Mathematics and Combinatorial Computing
  • Publication Date IconApr 15, 2025
  • Author Icon Chenyue Hui
Cite IconCite
Chat PDF IconChat PDF
Save

Multi-authority attribute encryption scheme based on cloud computing verifiable outsourcing decryption

Multi-authority attribute encryption scheme based on cloud computing verifiable outsourcing decryption

Read full abstract
  • Journal IconIET Conference Proceedings
  • Publication Date IconApr 1, 2025
  • Author Icon Jingyu Mao
Cite IconCite
Chat PDF IconChat PDF
Save

Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT

Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT

Read full abstract
  • Journal IconDigital Communications and Networks
  • Publication Date IconApr 1, 2025
  • Author Icon Qi Li + 6
Open Access Icon Open Access
Cite IconCite
Chat PDF IconChat PDF
Save

Fair-and-Exculpable-Attribute-Based Searchable Encryption With Revocation and Verifiable Outsourced Decryption Using Smart Contract

Fair-and-Exculpable-Attribute-Based Searchable Encryption With Revocation and Verifiable Outsourced Decryption Using Smart Contract

Read full abstract
  • Journal IconIEEE Internet of Things Journal
  • Publication Date IconFeb 15, 2025
  • Author Icon Liqing Chen + 3
Cite IconCite
Chat PDF IconChat PDF
Save

Robust Access Control for Secure IoT Outsourcing with Leakage Resilience.

The Internet of Things (IoT) has revolutionized various industries by enabling seamless connectivity and data exchange among devices. However, the security and privacy of outsourced IoT data remain critical challenges, especially given the resource constraints of IoT devices. This paper proposes a robust and leakage-resilient access control scheme based on Attribute-Based Encryption (ABE) with partial decryption outsourcing. The proposed scheme minimizes computational overhead on IoT devices by offloading intensive decryption tasks to the cloud, while ensuring resilience against master secret key leakage, side-channel attacks, and other common security threats. Comprehensive security analysis demonstrates the scheme's robustness under standard cryptographic assumptions, and performance evaluations show significant improvements in decryption efficiency, scalability, and computational performance compared to existing solutions. The proposed scheme offers a scalable, efficient, and secure access control framework, making it highly suitable for real-world IoT deployments across domains such as smart healthcare, industrial IoT, and smart cities.

Read full abstract
  • Journal IconSensors (Basel, Switzerland)
  • Publication Date IconJan 22, 2025
  • Author Icon Khaled Riad
Cite IconCite
Chat PDF IconChat PDF
Save

A Cross-domain Data Sharing Scheme for VANETs Based on Blockchain

With the continuous development of the Vehicular Ad Hoc Network (VANET), cross-domain sharing of vehicle data has become a significant concern. The Ciphertext-Policy Attribute-Based Encryption (CP-ABE) algorithm plays a key role in data sharing as it can achieve “one-to-many” transmission. In this paper, we propose a cross-domain data sharing scheme based on unpaired CP-ABE in VANETs, utilizing the blockchain and InterPlanetary File System (IPFS) system. The blockchain network is composed of trusted authorities (TAs) from different domains. Due to the high-speed movement characteristics of vehicles, we divide vehicle attributes into two categories: static and dynamic. we design a cross-domain data verification contract based on attribute bloom filter (ABF) for decryption testing. Vehicles that pass the test will receive dynamic attribute decryption keys generated by TAs in the data sharing domain to achieve cross-domain access. In addition, we design an outsourced decryption scheme to reduce the computational overhead during vehicle decryption and propose a direct permission revocation mechanism to ensure the flexibility and security of the system. The simulation experiment results show that our scheme optimizes the efficiency of cross-domain data access significantly compared with other approaches.

Read full abstract
  • Journal IconJournal of Internet Technology
  • Publication Date IconNov 30, 2024
  • Author Icon Wan-Yu Shang + 2
Cite IconCite
Chat PDF IconChat PDF
Save

An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things.

The Internet of Things (IoT) is a heterogeneous network composed of numerous dynamically connected devices. While it brings convenience, the IoT also faces serious challenges in data security. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptography method that supports fine-grained access control, offering a solution to the IoT's security issues. However, existing CP-ABE schemes are inefficient and unsuitable for IoT devices with limited computing resources. To address this problem, this paper proposes an efficient pairing-free CP-ABE scheme for the IoT. The scheme is based on lightweight elliptic curve scalar multiplication and supports multi-authority and verifiable outsourced decryption. The proposed scheme satisfies indistinguishability against chosen-plaintext attacks (CPA) under the elliptic curve decisional Diffie-Hellman (ECDDH) problem. Performance analysis shows that our proposed scheme is more efficient and better suited to the IoT environment compared to existing schemes.

Read full abstract
  • Journal IconSensors (Basel, Switzerland)
  • Publication Date IconOct 24, 2024
  • Author Icon Chong Guo + 5
Open Access Icon Open Access
Cite IconCite
Chat PDF IconChat PDF
Save

A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare

A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare

Read full abstract
  • Journal IconComputer Standards & Interfaces
  • Publication Date IconOct 19, 2024
  • Author Icon Yue Dai + 4
Cite IconCite
Chat PDF IconChat PDF
Save

Power Trading and Access Control Scheme Based on IPFS and Blockchain

In recent years, a large number of renewable energy power plants have been built all over the country, which has led to a sharp increase in the pressure on the current centralized electricity trading platform. There are data storage bottlenecks and data privacy problems in the current blockchain-based power transaction and access control system. In this paper, the interstellar file system is proposed to store the data of the new distributed power trading platform in a distributed way, so as to improve the storage capacity of the physical nodes; An improved ciphertext strategy attribute encryption scheme, which is lightweight, traceable and supports outsourced decryption combined with state secret algorithm, is adopted to integrate the user’s unique identity into the user’s private key and part of the expensive decryption calculation is outsourced to the cloud server to realize fine-grained data access control in the electricity market. The experimental results show that compared to the basic CP-ABE scheme, when the encryption attribute is 100, the decryption time of the proposed scheme is reduced from 556[Formula: see text]ms to 1.1[Formula: see text]ms; Compared to blockchain-based solutions alone, when storing data of 15[Formula: see text]MB, GAS consumption decreases from 2968738133 to 89360. The scheme can greatly improve the storage capacity of the system, improve the operational efficiency and meet the actual performance requirements.

Read full abstract
  • Journal IconInternational Journal of High Speed Electronics and Systems
  • Publication Date IconJul 12, 2024
  • Author Icon Shijie Shi + 4
Cite IconCite
Chat PDF IconChat PDF
Save

An Adaptive Secure and Practical Data Sharing System With Verifiable Outsourced Decryption

An Adaptive Secure and Practical Data Sharing System With Verifiable Outsourced Decryption

Read full abstract
  • Journal IconIEEE Transactions on Services Computing
  • Publication Date IconMay 1, 2024
  • Author Icon Shengmin Xu + 5
Cite IconCite
Chat PDF IconChat PDF
Save

Secure and efficient communications with fine-grained access control in underwater wireless sensor networks

Secure and efficient communications with fine-grained access control in underwater wireless sensor networks

Read full abstract
  • Journal IconICT Express
  • Publication Date IconApr 26, 2024
  • Author Icon Donghyun Yu + 2
Open Access Icon Open Access
Cite IconCite
Chat PDF IconChat PDF
Save

Attribute-based key management for patient-centric and trusted data access in blockchain-enabled IoMT

Attribute-based key management for patient-centric and trusted data access in blockchain-enabled IoMT

Read full abstract
  • Journal IconComputer Networks
  • Publication Date IconApr 17, 2024
  • Author Icon Axin Xiang + 4
Cite IconCite
Chat PDF IconChat PDF
Save

Attribute-Based Data Sharing Scheme Using Blockchain for 6G-Enabled VANETs

The advent of 6G communications technology will bring about a transition from the “Internet of Everything” to the “Intelligent Connection of Everything”. 6G-enabled vehicular ad hoc networks (VANETs) will enjoy lower latency, higher speed, and greater capacity network services. Nevertheless, achieving secure data sharing will be an even tougher challenge. Given this, we propose an attribute-based data sharing scheme with blockchain for 6G-enabled VANETs. First, we propose an efficient multi-tree-based user revocation mechanism. With the Chinese remainder theorem, our mechanism supports user batch revocation and batch joining. Second, we achieve distributed data storage by utilizing the blockchain and smart contracts. To solve the problem of insufficient storage capacity on the blockchain, we adopt a combination of on-chain and off-chain storage. Third, to reduce the computation burden on users, our proposal supports online/offline encryption and verifiable outsourced decryption. Meanwhile, our mechanism supports policy hiding, data revocation, and cross-domain data sharing. The proposed scheme is proven to satisfy the indistinguishability under chosen plaintext attack (IND-CPA) in the standard model. Theoretical analysis shows that our mechanism outperforms existing schemes in functionality and security. Simulation experiments show that our proposal is efficient and suitable for 6G-enabled VANETs.

Read full abstract
  • Journal IconIEEE Transactions on Mobile Computing
  • Publication Date IconApr 1, 2024
  • Author Icon Zhenzhen Guo + 4
Cite IconCite
Chat PDF IconChat PDF
Save

Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud

Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud

Read full abstract
  • Journal IconComputer Standards & Interfaces
  • Publication Date IconMar 20, 2024
  • Author Icon Zesen Hou + 4
Cite IconCite
Chat PDF IconChat PDF
Save

Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract

Outsourcing the heavy decryption computation to a cloud service provider has been a promising solution for a resource-constrained mobile device to deploy an attribute-based encryption scheme. However, the current attribute based encryption with outsourced decryption schemes only enable the mobile device to verify whether the cloud service provider has returned a correct decryption result, they lack a mechanism to enable the cloud service provider to escape from a mobile device's wrong claim if it has returned a correct decryption result. This paper, for the first time, proposes an attribute based encryption with reliable outsourced decryption scheme using the blockchain smart contract. In the proposed scheme, not only can the mobile device verify whether the cloud service provider has returned a correct decryption result, but also the cloud service provider can escape from a wrong claim if the returned decryption result is correct. Moreover, our system achieves the fairness property, which means the cloud service provider can get the reward from the mobile device if and only if it has returned a correct decryption result. Finally, we conduct an implementation to demonstrate that the proposed scheme is practical and efficient.

Read full abstract
  • Journal IconIEEE Transactions on Dependable and Secure Computing
  • Publication Date IconMar 1, 2024
  • Author Icon Chunpeng Ge + 4
Cite IconCite
Chat PDF IconChat PDF
Save

ReLAC: Revocable and Lightweight Access Control With Blockchain for Smart Consumer Electronics

The increasing popularity of consumer smart devices has led to concerns about the security of electronic data. Blockchains, which are tamper-proof, can be used to store electronic data securely, preserving the privacy of individuals and devices. However, most of the consumer smart devices are resource-constrained, so the computational overhead of blockchain based schemes should not be ignored. Furthermore, the dynamic change of consumer smart devices in real-world scenarios is also an open issue. In this paper, a revocable and lightweight access control scheme (ReLAC) is proposed to realize deduplication and dynamic user revocation for smart consumer electronics/devices using blockchain. To protect the privacy of consumers and devices in the access matrix, the partially hidden policy is adopted in the proposed scheme. Note that, no detailed attribute values of the consumers or the devices are included in the ciphertext transmission. Finally, outsourced decryption is applied to solve the resource-constrained problem of smart consumer electronics/devices. The proposed scheme is proved to be s-IND-CPA secure in the standard model if there exists no one can crackle the decisional q-BDHE assumption. The performance analysis and experiments demonstrate that the proposed scheme is secure and computational efficiency for the application in consumer electronic systems.

Read full abstract
  • Journal IconIEEE Transactions on Consumer Electronics
  • Publication Date IconFeb 1, 2024
  • Author Icon Jianfeng Zong + 4
Cite IconCite
Chat PDF IconChat PDF
Save

WEB CLOUD WEB-BASED CLOUD STORAGE FOR SECURE DATA SHARING ACROSS PLATFORMS

WEB CLOUD WEB-BASED CLOUD STORAGE FOR SECURE DATA SHARING ACROSS PLATFORMS

Read full abstract
  • Journal IconJournal of Engineering Sciences
  • Publication Date IconJan 1, 2024
  • Author Icon M Maheshwari + 3
Cite IconCite
Chat PDF IconChat PDF
Save

A secure multi‐authority attribute based encryption approach for robust smart grids

Abstract This paper presents EMBASS, an Enhanced Multi‐Authority Attribute‐Based Encryption System for Smart Grids. EMBASS supports outsourced decryption to devices with limited resources. It also uses a proxy to add fake values to the access policy in order to protect against malicious users. Additionally, a proxy user assistant is utilized to create an intermediate key for each fog node in the decryption process, and a chain decryption technique is used to further delegate the decryption process. The security properties and performance of the proposed system are analyzed, discussed and compared to state of the art approaches. EMBASS has been discussed for usage with smart grids, and experimentation shows that it yields promising results compared to state‐of‐the‐art approaches.

Read full abstract
  • Journal IconConcurrency and Computation: Practice and Experience
  • Publication Date IconNov 27, 2023
  • Author Icon Ahmed Saidi + 2
Cite IconCite
Chat PDF IconChat PDF
Save

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • .
  • .
  • 1
  • 2
  • 3
  • 4
  • 5

Popular topics

  • Latest Artificial Intelligence papers
  • Latest Nursing papers
  • Latest Psychology Research papers
  • Latest Sociology Research papers
  • Latest Business Research papers
  • Latest Marketing Research papers
  • Latest Social Research papers
  • Latest Education Research papers
  • Latest Accounting Research papers
  • Latest Mental Health papers
  • Latest Economics papers
  • Latest Education Research papers
  • Latest Climate Change Research papers
  • Latest Mathematics Research papers

Most cited papers

  • Most cited Artificial Intelligence papers
  • Most cited Nursing papers
  • Most cited Psychology Research papers
  • Most cited Sociology Research papers
  • Most cited Business Research papers
  • Most cited Marketing Research papers
  • Most cited Social Research papers
  • Most cited Education Research papers
  • Most cited Accounting Research papers
  • Most cited Mental Health papers
  • Most cited Economics papers
  • Most cited Education Research papers
  • Most cited Climate Change Research papers
  • Most cited Mathematics Research papers

Latest papers from journals

  • Scientific Reports latest papers
  • PLOS ONE latest papers
  • Journal of Clinical Oncology latest papers
  • Nature Communications latest papers
  • BMC Geriatrics latest papers
  • Science of The Total Environment latest papers
  • Medical Physics latest papers
  • Cureus latest papers
  • Cancer Research latest papers
  • Chemosphere latest papers
  • International Journal of Advanced Research in Science latest papers
  • Communication and Technology latest papers

Latest papers from institutions

  • Latest research from French National Centre for Scientific Research
  • Latest research from Chinese Academy of Sciences
  • Latest research from Harvard University
  • Latest research from University of Toronto
  • Latest research from University of Michigan
  • Latest research from University College London
  • Latest research from Stanford University
  • Latest research from The University of Tokyo
  • Latest research from Johns Hopkins University
  • Latest research from University of Washington
  • Latest research from University of Oxford
  • Latest research from University of Cambridge

Popular Collections

  • Research on Reduced Inequalities
  • Research on No Poverty
  • Research on Gender Equality
  • Research on Peace Justice & Strong Institutions
  • Research on Affordable & Clean Energy
  • Research on Quality Education
  • Research on Clean Water & Sanitation
  • Research on COVID-19
  • Research on Monkeypox
  • Research on Medical Specialties
  • Research on Climate Justice
Discovery logo
FacebookTwitterLinkedinInstagram

Download the FREE App

  • Play store Link
  • App store Link
  • Scan QR code to download FREE App

    Scan to download FREE App

  • Google PlayApp Store
FacebookTwitterTwitterInstagram
  • Universities & Institutions
  • Publishers
  • R Discovery PrimeNew
  • Ask R Discovery
  • Blog
  • Accessibility
  • Topics
  • Journals
  • Open Access Papers
  • Year-wise Publications
  • Recently published papers
  • Pre prints
  • Questions
  • FAQs
  • Contact us
Lead the way for us

Your insights are needed to transform us into a better research content provider for researchers.

Share your feedback here.

FacebookTwitterLinkedinInstagram
Cactus Communications logo

Copyright 2025 Cactus Communications. All rights reserved.

Privacy PolicyCookies PolicyTerms of UseCareers