1 research outputs found

    A New Access Control Policy and MAC Mechanism for Verifiable Delegation in Cloud

    Get PDF
    An efficient file hierarchy attribute-based encryption scheme is proposed in cloud computing. The layered access structures are incorporated into a solitary access structure, and afterward, the progressive documents are scrambled with the coordinated access structure. The ciphertext segments identified with qualities could be shared by the documents. In this way, both ciphertext stockpiling and time cost of encryption are spared. In addition, the proposed conspire is turned out to be secure under the standard assumption. The proposed plot has leeway that clients can unscramble all approval documents by figuring mystery key once. Along these lines, the time cost of unscrambling is additionally spared if the client needs to decode numerous documents. Results demonstrates that the proposed conspire is exceedingly proficient as far as encryption and decryption
    corecore