Figure 2 - uploaded by Hao Guo
Content may be subject to copyright.
Ethereum transaction example from etherscan.io.

Ethereum transaction example from etherscan.io.

Source publication
Preprint
Full-text available
Attribute-based access control makes access control decisions based on the assigned attributes of subjects and the access policies to protect objects by mediating operations from the subjects. Authority, which validates attributes of subjects, is one key component to facilitate attribute-based access control. In an increasingly decentralized societ...

Contexts in source publication

Context 1
... addition, it can also trigger the execution of the code in the smart contract through one transaction. Figure 2 and 3 shows the Ethereum trans- action data structure and one screenshot from the Etherscan web- site (etherscan.io). One unique Ethereum transaction consists of the following data field: Nonce, represents for the transaction se- quence number from the sender. ...
Context 2
... addition, it can also trigger the execution of the code in the smart contract through one transaction. Figure 2 and 3 shows the Ethereum trans- action data structure and one screenshot from the Etherscan web- site (etherscan.io). One unique Ethereum transaction consists of the following data field: Nonce, represents for the transaction se- quence number from the sender. ...

Similar publications

Article
Full-text available
In those broadcast application scenarios with a great quantity of receivers, e.g., the data access control system in cloud storage service, the single sender is apt to become the efficiency bottleneck of the system, because the computation and storage overhead of the sender will grow rapidly with the amount of qualified receivers. In order to overc...
Article
Full-text available
Ciphertext-policy attribute-based encryption (CP-ABE) can offer fine-grained access control over encrypted data, which is suitable for the complex commercial applications. However, since the same decryption privileges could be shared by multiple users in the one-to-many encryption mechanism, it is dangerous that a malicious user misuses his secret...
Preprint
Full-text available
Data encryption limits the power and efficiency of queries. Direct processing of encrypted data should ideally be possible to avoid the need for data decryption, processing, and re-encryption. It is vital to keep the data searchable and sortable. That is, some information is intentionally leaked. This intentional leakage technology is known as "que...
Article
Full-text available
The attribute-based encryption (ABE) scheme is suitable for access control of ciphertext in cloud computing. Kowalczyk and Wee proposed an adaptively secure attribute-based encryption scheme that supports NC1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepac...
Article
Full-text available
We propose a novel variant of functional encryption which supports ciphertext updates, dubbed ciphertext-updatable functional encryption. Such a feature further broadens the practical applicability of the functional encryption paradigm and allows for fine-grained access control even after a ciphertext is generated. Updating ciphertexts is carried o...