2017 3rd IEEE International Conference on Control Science and Systems Engineering (ICCSSE) 2017
DOI: 10.1109/ccsse.2017.8088017
|View full text |Cite
|
Sign up to set email alerts
|

A multi-authority attribute-based encryption access control for social network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…For example, some works [21,22] assumed that the service provider is honest and that it has the authority to access the location plaintext without leaking any information to others. Some works [21,23,24] introduced a trusted third party (TTP) to achieve the trade-off between security and efficiency. Unfortunately, there may not exist such a TTP in real MSNs scenarios.…”
Section: Location Privacymentioning
confidence: 99%
See 1 more Smart Citation
“…For example, some works [21,22] assumed that the service provider is honest and that it has the authority to access the location plaintext without leaking any information to others. Some works [21,23,24] introduced a trusted third party (TTP) to achieve the trade-off between security and efficiency. Unfortunately, there may not exist such a TTP in real MSNs scenarios.…”
Section: Location Privacymentioning
confidence: 99%
“…Let BE = {BE .KeyGen, BE .J oin, BE .E nc, BE .Dec} be a broadcast encryption scheme that retains CPA secure against a coalition of revoked users [22], P = {P.KeyGen, P. E nc, P.Dec} be the Pallier encryption scheme [23], GM = {GM.KeyGen, GM.E nc, GM.Dec} 250 be the Goldwasser-Micali encryption scheme [24], and F : {0, 1} k × {0, 1} * → {0, 1} k be a pseudo-random function. The detailed construction is given as follows:…”
Section: The Detailed Constructionmentioning
confidence: 99%
“…• ReKey(D, rk, θ → sk ): Takes as input the attribute component D of the user secret key sk, proxy re-keys having the same version as the user secret key sk and attributes in sk whose proxy re-keys in rk are not 1 and outputs an updated user secret key sk . However, [99]- [102] schemes rely on the centralized multiauthority ABE and hence suffer from the weaknesses of the centralized multi-authority ABE discussed earlier in section IV-D.1.…”
Section: ) Attribute Based Encryption Schemes With Revocationsmentioning
confidence: 99%
“…These result in the additional components contributing to the increase in encryption computation complexity. For the decryption, the decryption computation complexity increases with the number of user attributes except for the YJR [100], FTWLY [97], and YYYL [99] schemes. For the YJR [100], FTWLY [97] and YYYL [99] schemes, a decryption token generated by a server minimizes the decryption computation burden on the user and hence the constant decryption complexity.…”
Section: Computation Complexity Comparison Of Public Domain Abe Schemesmentioning
confidence: 99%