An expressive decentralizing KP-ABE scheme with constant-size ciphertext

被引:0
|
作者
Li, Qinyi [1 ]
Xiong, Hu [1 ,2 ]
Zhang, Fengli [1 ]
Zeng, Shengke [1 ]
机构
[1] Li, Qinyi
[2] 1,Xiong, Hu
[3] Zhang, Fengli
[4] Zeng, Shengke
来源
Li, Q. (leebluedreams@gmail.com) | 1600年 / Femto Technique Co., Ltd.卷 / 15期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:131 / 140
相关论文
共 50 条
  • [31] A Fully Secure KP-ABE Scheme on Prime-Order Bilinear Groups through Selective Techniques
    Obiri, Isaac Amankona
    Xia, Qi
    Xia, Hu
    Obour Agyekum, Kwame Opuni-Boachie
    Asamoah, Kwame Omono
    Sifah, Emmanuel Boateng
    Zhang, Xiaosong
    Gao, Jianbin
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [32] Comment on “Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups”
    Chan, Koon-Ming
    Heng, Swee-Huay
    Tan, Syh-Yuan
    Tan, Shing-Chiang
    IEEE ACCESS, 2024, 12 : 91551 - 91555
  • [33] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang Yang
    Yu-pu Hu
    Le-you Zhang
    Chun-hui Sun
    Journal of Zhejiang University SCIENCE C, 2011, 12 : 819 - 827
  • [34] Efficient Multi-Authority Attribute-Based Signcryption with Constant-Size Ciphertext
    Zhao, Yang
    Ruan, Ankang
    Dan, Guohang
    Huang, Jicheng
    Ding, Yi
    2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [36] Expressive Key-policy Attribute-based Constant-size Signature
    Rani, Shikha
    Ali, Syed Taqi
    2017 ISEA ASIA SECURITY AND PRIVACY CONFERENCE (ISEASP 2017), 2017, : 101 - 104
  • [37] Security Analysis of a Path Validation Scheme With Constant-Size Proof
    Wu, Yangyang
    Jiang, Changsong
    Xu, Chunxiang
    Chen, Kefei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4246 - 4248
  • [38] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang YANG Yupu HU Leyou ZHANG Chunhui SUN Department of Communication EngineeringXidian UniversityXian China Department of Mathematics and Computer ScienceFuzhou UniversityFuzhou China Department of Mathematics ScienceXidian UniversityXian China
    JournalofZhejiangUniversity-ScienceC(Computers&Electronics), 2011, 12 (10) : 819 - 827
  • [39] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang, Yang
    Hu, Yu-pu
    Zhang, Le-you
    Sun, Chun-hui
    JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2011, 12 (10): : 819 - 827
  • [40] A revocable storage CP-ABE scheme with constant ciphertext length in cloud storage
    Zhao, Yang
    Xie, Xin
    Zhang, Xing
    Ding, Yi
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (05) : 4229 - 4249