2015
DOI: 10.1007/978-3-319-27051-7_4
|View full text |Cite
|
Sign up to set email alerts
|

A Provably Secure Ciphertext-Policy Hierarchical Attribute-Based Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…e first algorithm is an attribute encryption algorithm that is based on ciphertext policy ABE (CP-ABE), which embeds access strategy into ciphertext, while the user's private key binds a set of attributes to represent the user's identity [6,7]. Wang et al [8] adopted the method [9] and extended most attribute encryption schemes based on a bilinear pairing operation to outsourced attribute encryption schemes. Lai et al [10] considered the security verification of outsourcing decryption based on [9] and proposed an ABE scheme that supports verifiable outsourcing decryption and proves the security of the scheme with the standard model; however, the efficiency of the scheme is low.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…e first algorithm is an attribute encryption algorithm that is based on ciphertext policy ABE (CP-ABE), which embeds access strategy into ciphertext, while the user's private key binds a set of attributes to represent the user's identity [6,7]. Wang et al [8] adopted the method [9] and extended most attribute encryption schemes based on a bilinear pairing operation to outsourced attribute encryption schemes. Lai et al [10] considered the security verification of outsourcing decryption based on [9] and proposed an ABE scheme that supports verifiable outsourcing decryption and proves the security of the scheme with the standard model; however, the efficiency of the scheme is low.…”
Section: Related Workmentioning
confidence: 99%
“…To evaluate the computational efficiency of the scheme proposed in this paper, the computational overhead in the stages of private key generation, encryption, and decryption is theoretically analysed. e computational efficiency of this scheme is compared with that of the ABE scheme in [8,[13][14][15]18]. In the process of the comparison, |U| represents the number of all attributes in the system, |S| denotes the number of attributes of DU, s represents a set of attributes that satisfies the decryption requirements, and l represents the number of rows in matrix M in LSSS.…”
Section: 1mentioning
confidence: 99%
See 2 more Smart Citations
“…Green et al [15] provided an ABE scheme in which partial decryption operations are outsourced to the CS. Wang et al [24] proposed an adaptive security outsourcing CP-ABE scheme. But, they only considered the requirements of decryption outsourcing.…”
Section: ) Attribute-based Encryption (Abe)mentioning
confidence: 99%