Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption

被引:0
|
作者
Kai ZHANG [1 ]
Jianfeng MA [2 ]
Jiajia LIU [3 ]
Hui LI [3 ]
机构
[1] School of Telecommunications Engineering, Xidian University
[2] School of Computer Science and Technology, Xidian University
[3] School of Cyber Engineering, Xidian University
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
GID; SKS; LSSS; ABE; CPA;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
Dear editor,Attribute-based encryption(ABE)was first introduced by Sahai and Waters[1]where the decryption ability of a user is based on his attributes.Later,it was divided into ciphertext-policy ABE(CP-ABE)and key-policy ABE(KP-ABE)[2].
引用
收藏
页码:256 / 258
页数:3
相关论文
共 50 条
  • [31] Key-Policy Multi-authority Attribute-Based Encryption
    Longo, Riccardo
    Marcolla, Chiara
    Sala, Massimiliano
    [J]. ALGEBRAIC INFORMATICS (CAI 2015), 2015, 9270 : 152 - 164
  • [32] Robust and Provably Secure Attribute-Based Encryption Supporting Access Revocation and Outsourced Decryption
    Bkakria, Anis
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXVI, DBSEC 2022, 2022, 13383 : 197 - 214
  • [33] Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
    Rouselakis, Yannis
    Waters, Brent
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY (FC 2015), 2015, 8975 : 315 - 332
  • [34] Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices
    Kuchta, Veronika
    Markowitch, Olivier
    [J]. PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 409 - 435
  • [35] Multi-authority attribute-based encryption with honest-but-curious central authority
    Bozovic, Vladimir
    Socek, Daniel
    Steinwandt, Rainer
    Villanyi, Viktoria I.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2012, 89 (03) : 268 - 283
  • [36] Efficient Offline/Online Attribute Based Encryption with Verifiable Outsourced Decryption
    Zhao Zhiyuan
    Sun Lei
    Hu Jiafu
    Zhou Shie
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (12) : 2998 - 3006
  • [37] Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage
    Ming, Yang
    He, Baokang
    Wang, Chenhao
    [J]. IEEE ACCESS, 2021, 9 : 42593 - 42603
  • [38] Multi-authority attribute based encryption
    Chase, Melissa
    [J]. Theory of Cryptography, Proceedings, 2007, 4392 : 515 - 534
  • [39] TRACEABLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD COMPUTING
    Yang, Xiaodong
    Yang, Ping
    An, Faying
    Zhou, Qixu
    Yang, Miaomiao
    [J]. 2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 263 - 267
  • [40] A Multi-authority Attribute-Based Encryption Access Control for Social Network
    Yang, Xiao-dong
    Yang, Miao-miao
    Yang, Ping
    Leng, Qi
    [J]. CONFERENCE PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON CONTROL SCIENCE AND SYSTEMS ENGINEERING (ICCSSE), 2017, : 671 - 674