Blind expressive ciphertext policy attribute based encryption for fine grained access control on the encrypted data

被引:0
|
作者
School of Computer Science and Engineering, University of Electronic Science and Technology of China, No.2006 Xiyuan Avenue, West Hi-tech Zone, Chengdu [1 ]
611731, China
不详 [2 ]
机构
来源
Int. J. Netw. Secur. | / 6卷 / 661-671期
关键词
Bilinear map - Ciphertext-policy attribute-based encryptions - Oblivious transfer - Secret sharing - Standard model;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Fine Grained Attribute Based Access Control of Healthcare Data
    Mrema, Edward
    Kumar, Vimal
    2018 12TH INTERNATIONAL SYMPOSIUM ON MEDICAL INFORMATION AND COMMUNICATION TECHNOLOGY (ISMICT), 2018, : 47 - 51
  • [22] Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update
    Jiang, Yinhao
    Susilo, Willy
    Mu, Yi
    Guo, Fuchun
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 39 - 60
  • [23] Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data
    Shiraishi, Yoshiaki
    Nomura, Kenta
    Mohri, Masami
    Naruse, Takeru
    Morii, Masakatu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (10): : 2432 - 2439
  • [24] Expressive ciphertext-policy attribute-based encryption with direct user revocation
    Bai C.
    Zhang Y.
    Ma H.
    Liu Z.
    International Journal of Embedded Systems, 2017, 9 (06) : 495 - 504
  • [25] Expressive Ciphertext Policy Attribute-Based Searchable Encryption for Medical Records in Cloud
    Wu, Qing
    Ma, Xujin
    Zhang, Leyou
    Chen, Yanru
    Ma, Xujin (mxj419@126.com), 1600, Femto Technique Co., Ltd. (23): : 461 - 472
  • [26] Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access Control
    Lang, Bo
    Xu, Runhua
    Duan, Yawei
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 147 - 157
  • [27] Dual-Policy Attribute Based Encryption: Simultaneous Access Control with Ciphertext and Key Policies
    Attrapadung, Nuttapong
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 116 - 125
  • [28] An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited
    Cui, Hui
    Deng, Robert H.
    Lai, Junzuo
    Yi, Xun
    Nepal, Surya
    COMPUTER NETWORKS, 2018, 133 : 157 - 165
  • [29] Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Li, Jiguo
    Wang, Haiping
    Zhang, Yichen
    Shen, Jian
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3339 - 3352
  • [30] Bounded ciphertext policy attribute based encryption
    Goyal, Vipul
    Jain, Abhishek
    Pandey, Omkant
    Sahai, Amit
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, PROCEEDINGS, 2008, 5126 : 579 - 591