Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme

Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme ABSTRACT: In a decentralized attribute-based encryption (ABE) system, any party can act as an authority by creating a public key and issuing private keys to different users that reflect their attributes without any collaboration. Such an ABE scheme can eliminate the burden of heavy communication […]


A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation

A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation ABSTRACT: This paper presents a secure protocol for spontaneous wireless ad hoc networks which uses a hybrid symmetric/ asymmetric scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will be used to encrypt the […]