版权说明 操作指南
首页 > 成果 > 详情

Blockchain-Aided Searchable Encryption-Based Two-Way Attribute Access Control Research

认领
导出
Link by DOI
反馈
分享
QQ微信 微博
成果类型:
期刊论文
作者:
Xu, Zhigang;Zhang, Shiguang;Han, Hongmu;Dong, Xinhua;Zheng, Zhiqiang;...
通讯作者:
Zhigang Xu<&wdkj&>Shiguang Zhang<&wdkj&>Wenlong Tian<&wdkj&>Haitao Wang<&wdkj&>Zhiqiang Zheng<&wdkj&>Hongmu Han<&wdkj&>Xinhua Dong
作者机构:
[Han, Hongmu; Zheng, Zhiqiang; Zhang, Shiguang; Xu, Zhigang; Dong, Xinhua] Hubei Univ Technol, Sch Comp Sci, Hubei Univ, Wuhan 430068, Peoples R China.
[Tian, Wenlong; Wang, Haitao] Dept Publ Secur Guangdong Prov, Narcot Control Bur, Guangzhou 510050, Peoples R China.
[Leng, Jiewu] Univ South China, Sch Comp Sci & Technol, Hengyang 421001, Peoples R China.
通讯机构:
[Zhigang Xu; Shiguang Zhang; Wenlong Tian; Hongmu Han; Xinhua Dong] S
[Haitao Wang; Zhiqiang Zheng] N
Narcotics Control Bureau of Department of Public Security of Guangdong Province,Guangzhou 510050,null,China<&wdkj&>School of Computer Science and Technology,University of South China,Hengyang 421001,China<&wdkj&>School of Computer Science,Hubei University of Hubei University of Technology,Wuhan 430068,China
语种:
英文
关键词:
Introduction;Materials and Methods;Results;Discussion;Conclusion;Abstract;Data Availability;Additional Points;Ethical Approval;Consent;Disclosure;Conflicts of Interests;Authors’ Contributions;Funding Statement;Acknowledgements;Acknowledgments;Supplementary Materials;Reference;Dataset Description;Dataset Files;Abstract;Introduction;Introduction and Materials;Introduction and Methods;Materials;Materials and Methods;Methods;Results;Discussion;Results and Discussion;Discussion and Conclusion;Results and Conclusion;Conclusion;Conclusions;Data Availability;Additional Points;Ethical Approval;Consent;Disclosure;Conflicts of Interest;Authors’ Contributions;Funding Statement;Acknowledgements;Supplementary Materials;References;Appendix;Abbreviations;Preliminaries;Introduction and Preliminaries;Notation;Proof of Theorem;Proofs;Analysis of Results;Examples;Numerical Example;Applications;Numerical Simulation;Model;Model Formulation;Systematic Palaeontology;Nomenclatural Acts;Taxonomic Implications;Experimental;Synthesis;Overview;Characterization;Background;Experimental;Theories;Calculations;Model Verification;Model Implementation;Geographic location;Study Area;Geological setting;Data Collection;Field Testing;Data and Sampling;Dataset;Literature Review;Related Works;Related Work;System Model;Methods and Data;Experimental Results;Results and Analysis;Evaluation;Implementation;Case Presentation;Case Report;Search Terms;Case Description;Case Series;Background;Limitations;Additional Points;Case;Case 1;Case 2 etc.;Concern Details;Retraction Details;Copyright;Related Articles
期刊:
Security and Communication Networks
ISSN:
1939-0114
年:
2022
卷:
2022
基金类别:
National Natural Science Foundation of China [61772180]; Key-Area Research and Development Program of Guangdong Province [2020B1111420002]; Key-Area Research and Development Program of Hubei Province [2022BAA040]; Science and Technology Project of Department of Transport of Hubei Province [2022-11-4-3]; Innovation Fund of Hubei University of Technology [BSQD2019027, BSQD2019020, BSQD2016019]
机构署名:
本校为其他机构
院系归属:
计算机科学与技术学院
摘要:
In the Internet of Things (IoT), data sharing security is important to social security. It is a huge challenge to enable more accurate and secure access to data by authorized users. Blockchain access control schemes are mostly one-way access control, which cannot meet the need for ciphertext search, two-way confirmation of users and data, and secure data transmission. Thus, this paper proposes a blockchain-aided searchable encryption-based two-way attribute access control scheme (STW-ABE). The scheme combines ciphertext attribute access control, key attribute access control, and ciphertext sea...

反馈

验证码:
看不清楚,换一个
确定
取消

成果认领

标题:
用户 作者 通讯作者
请选择
请选择
确定
取消

提示

该栏目需要登录且有访问权限才可以访问

如果您有访问权限,请直接 登录访问

如果您没有访问权限,请联系管理员申请开通

管理员联系邮箱:yun@hnwdkj.com