A Hierarchical Attribute-Based Encryption Scheme

被引:3
|
作者
ZOU Xiubin [1 ]
机构
[1] College of Computer and Mathematics,Jianghan University
基金
中国国家自然科学基金;
关键词
attribute-based encryption; hierarchical attributebased encryption; identity-based encryption(IBE); bilinear map;
D O I
暂无
中图分类号
TP309.7 [加密与解密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
According to the relation of an attribute set and its subset,the author presents a hierarchical attribute-based encryption scheme in which a secret key is associated with an attribute set.A user can delegate the private key corresponding to any subset of an attribute set while he has the private key corresponding to the attribute set.Moreover,the size of the ciphertext is constant,but the size of private key is linear with the order of the attribute set in the hierarchical attribute-based encryption scheme.Lastly,we can also prove that this encryption scheme meets the security of IND-sSETCPA in the standard model.
引用
收藏
页码:259 / 264
页数:6
相关论文
共 50 条
  • [1] A fully distributed hierarchical attribute-based encryption scheme
    Ali, Mohammad
    Mohajeri, Javad
    Sadeghi, Mohammad-Reza
    Liu, Ximeng
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 815 : 25 - 46
  • [2] Attribute-Based Encryption Scheme Based on SIFF
    Zhao, Tianyu
    Wei, Lingbo
    Zhang, Chi
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [3] A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing
    Fu, Junsong
    Wang, Na
    [J]. IEEE ACCESS, 2019, 7 : 36218 - 36232
  • [4] Software Implementation of an Attribute-Based Encryption Scheme
    Zavattoni, Eric
    Dominguez Perez, Luis J.
    Mitsunari, Shigeo
    Sanchez-Ramirez, Ana H.
    Teruya, Tadanori
    Rodriguez-Henriquez, Francisco
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (05) : 1429 - 1441
  • [5] Improvement of an outsourced attribute-based encryption scheme
    Chen, Hongjie
    Liao, Yongjian
    [J]. SOFT COMPUTING, 2019, 23 (22) : 11409 - 11417
  • [6] Efficient revocable attribute-based encryption scheme
    Li, Xuejun
    Zhang, Dan
    Li, Hui
    [J]. Tongxin Xuebao/Journal on Communications, 2019, 40 (06): : 32 - 39
  • [7] Improvement of an outsourced attribute-based encryption scheme
    Hongjie Chen
    Yongjian Liao
    [J]. Soft Computing, 2019, 23 : 11409 - 11417
  • [8] An Attribute-Based Encryption Scheme Based on Unrecognizable Trapdoors
    Du, Ruizhong
    Tan, Ailun
    Tian, Junfeng
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2020, 25 (05) : 579 - 588
  • [9] An Attribute-Based Encryption Scheme Based on Unrecognizable Trapdoors
    Ruizhong Du
    Ailun Tan
    Junfeng Tian
    [J]. Tsinghua Science and Technology, 2020, 25 (05) : 579 - 588
  • [10] Security analyses of a data collaboration scheme with hierarchical attribute-based encryption in cloud computing
    Tai, Wei-Liang
    Chang, Ya-Fen
    Huang, Wen-Hsin
    [J]. International Journal of Network Security, 2020, 22 (02): : 212 - 217