Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption

被引:0
|
作者
Kai ZHANG [1 ]
Jianfeng MA [2 ]
Jiajia LIU [3 ]
Hui LI [3 ]
机构
[1] School of Telecommunications Engineering, Xidian University
[2] School of Computer Science and Technology, Xidian University
[3] School of Cyber Engineering, Xidian University
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
GID; SKS; LSSS; ABE; CPA;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
Dear editor,Attribute-based encryption(ABE)was first introduced by Sahai and Waters[1]where the decryption ability of a user is based on his attributes.Later,it was divided into ciphertext-policy ABE(CP-ABE)and key-policy ABE(KP-ABE)[2].
引用
收藏
页码:256 / 258
页数:3
相关论文
共 50 条
  • [41] Multi-authority attribute based encryption
    Chase, Melissa
    [J]. Theory of Cryptography, Proceedings, 2007, 4392 : 515 - 534
  • [42] TRACEABLE MULTI-AUTHORITY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR CLOUD COMPUTING
    Yang, Xiaodong
    Yang, Ping
    An, Faying
    Zhou, Qixu
    Yang, Miaomiao
    [J]. 2017 14TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2017, : 263 - 267
  • [43] A Multi-authority Attribute-Based Encryption Access Control for Social Network
    Yang, Xiao-dong
    Yang, Miao-miao
    Yang, Ping
    Leng, Qi
    [J]. CONFERENCE PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON CONTROL SCIENCE AND SYSTEMS ENGINEERING (ICCSSE), 2017, : 671 - 674
  • [44] Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata
    Pradhan, Ankit
    Sethi, Kamalakanta
    Mohapatra, Shrohan
    Bera, Padmalochan
    [J]. CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 434 - 456
  • [45] Adaptively Secure Attribute-Based Encryption Supporting Attribute Revocation
    Wu Qiuxin
    Zhang Miao
    [J]. CHINA COMMUNICATIONS, 2012, 9 (09) : 22 - 40
  • [46] Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles
    Liu, Zhen
    Cao, Zhenfu
    Huang, Qiong
    Wong, Duncan S.
    Yuen, Tsz Hon
    [J]. COMPUTER SECURITY - ESORICS 2011, 2011, 6879 : 278 - +
  • [47] Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage
    Nomura, Kenta
    Mohri, Masami
    Shiraishi, Yoshiaki
    Morii, Masakatu
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (10) : 2420 - 2431
  • [48] Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption
    Li, Yang
    Qi, Baoyue
    Wang, Mengmeng
    Zhu, Jianming
    Wang, Xiuli
    [J]. DATA SCIENCE (ICPCSEE 2022), PT II, 2022, 1629 : 105 - 124
  • [49] Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption
    Jing Li
    Xiong Li
    Licheng Wang
    Debiao He
    Haseeb Ahmad
    Xinxin Niu
    [J]. Soft Computing, 2018, 22 : 707 - 714
  • [50] Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption
    Li, Jing
    Li, Xiong
    Wang, Licheng
    He, Debiao
    Ahmad, Haseeb
    Niu, Xinxin
    [J]. SOFT COMPUTING, 2018, 22 (03) : 707 - 714