Direct Revocable Ciphertext Policy Attribute-Based Encryption Scheme with Constant-Size Ciphertext

被引:0
|
作者
Zhu, Guo-Bin [1 ,2 ]
Xie, Xin [1 ,2 ]
Zhang, Xing [1 ,2 ]
Zhao, Yang [1 ,2 ]
Xiong, Hu [1 ,2 ]
机构
[1] School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu,610054, China
[2] Network and Data Security Key Laboratory of Sichuan Province, Chengdu,610054, China
来源
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China | 2021年 / 50卷 / 01期
关键词
27;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:76 / 83
相关论文
共 50 条
  • [21] An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    Wang, Changji
    Luo, Jianfa
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [22] Traceable Ciphertext-policy Attribute-based Encryption Scheme with Constant Decryption Costs
    Wang Jianhua
    Wang Guangbo
    Xu Yang
    Hu Yixiao
    Zhang Yue
    Fan Liwen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (04) : 802 - 810
  • [23] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [24] Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud Computing
    Bouchaala, Mariem
    Ghazel, Cherif
    Saidane, Leila Azouz
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1860 - 1865
  • [25] Directly Revocable Attribute Based Encryption Scheme under Ciphertext-Policy
    Aqeel, Humera
    Ali, Syed Taqi
    2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 365 - 369
  • [26] Outsourced Attribute-Based Encryption Scheme with Policy Updating and Verifiable Ciphertext
    Su, Zelin
    Zhang, Wenfang
    Wang, Xiaomin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (12): : 3088 - 3097
  • [27] Ciphertext-policy attribute-based encryption scheme with verifiability on authority
    Yu J.
    He X.
    Yan X.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (04): : 49 - 57
  • [28] Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
    Shi, Yanfeng
    Zheng, Qingji
    Liu, Jigiang
    Han, Zhen
    INFORMATION SCIENCES, 2015, 295 : 221 - 231
  • [29] Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme
    Fu, Xingbing
    Nie, Xuyun
    Li, Fagen
    INFORMATION, 2015, 6 (03): : 481 - 493
  • [30] Efficient Multi-Authority Attribute-Based Signcryption with Constant-Size Ciphertext
    Zhao, Yang
    Ruan, Ankang
    Dan, Guohang
    Huang, Jicheng
    Ding, Yi
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,