An expressive decentralizing KP-ABE scheme with constant-size ciphertext

被引:0
|
作者
Li, Qinyi [1 ]
Xiong, Hu [1 ,2 ]
Zhang, Fengli [1 ]
Zeng, Shengke [1 ]
机构
[1] Li, Qinyi
[2] 1,Xiong, Hu
[3] Zhang, Fengli
[4] Zeng, Shengke
来源
Li, Q. (leebluedreams@gmail.com) | 1600年 / Femto Technique Co., Ltd.卷 / 15期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:131 / 140
相关论文
共 50 条
  • [41] A New Constant-Size Group Signature Scheme From Lattices
    Luo, Qin
    Jiang, Chun-Yang
    IEEE ACCESS, 2020, 8 : 10198 - 10207
  • [42] Constant-size ring signature scheme using multilinear maps
    Zhang, Xiangsong
    Liu, Zhenhua
    Wang, Xu An
    Wang, Fenghe
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2020, 12 (02) : 206 - 215
  • [43] Multi -Authority CP-ABE-Based user access control scheme with constant -size key and ciphertext for IoT deployment
    Banerjee, Soumya
    Roy, Sandip
    Odelu, Vanga
    Das, Ashok Kumar
    Chattopadhyay, Samiran
    Rodrigues, Joel J. P. C.
    Park, Youngho
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 53
  • [44] Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
    Zhang, Yinghui
    Zheng, Dong
    Chen, Xiaofeng
    Li, Jin
    Li, Hui
    PROVABLE SECURITY, PROVSEC 2014, 2014, 8782 : 259 - 273
  • [45] Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
    Attrapadung, Nuttapong
    Libert, Benoit
    de Panafieu, Elie
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 90 - +
  • [46] Identity-based ring signature scheme with constant-size signature
    Wang, Ling-Ling
    Zhang, Guo-Yin
    Ma, Chun-Guang
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2007, 29 (11): : 2645 - 2648
  • [47] An Enhanced Constant-Size Identity-Based Ring Signature Scheme
    Hu, Chengyu
    Liu, Pengtao
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 587 - +
  • [48] A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations
    Park, Jong Hwan
    Lee, Dong Hoon
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (09) : 1620 - 1631
  • [49] Multi-User Searchable Encryption Scheme With Constant-Size Keys
    Chang, YuJui
    Wu, JaLing
    2017 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICE COMPUTING (SC2 2017), 2017, : 98 - 103
  • [50] Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key
    Li, Jiguo
    Hu, Shengzhou
    Zhang, Yichen
    SECURITY AND COMMUNICATION NETWORKS, 2018,