2016
DOI: 10.1007/s11432-016-0012-9
|View full text |Cite
|
Sign up to set email alerts
|

Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption

Abstract: Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability SCIENCE CHINA Information Sciences 61, 032102 (2018); Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating SCIENCE CHINA Information Sciences 59, 042701 (2016); Accountable authority key policy attribute-based encryption SCIENCE CHINA Information Sciences 55, 1631 (2012); Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs SCIENCE CHINA … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(16 citation statements)
references
References 6 publications
0
16
0
Order By: Relevance
“…The schemes [26], [37] only support decryption outsourcing; the scheme [36] implements multi-keyword search; the scheme [38] support decryption outsourcing and multikeyword search; our VMKS-ABE scheme in cloud storage supports both encryption and decryption outsourcing as well as multi-keyword search.…”
Section: Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The schemes [26], [37] only support decryption outsourcing; the scheme [36] implements multi-keyword search; the scheme [38] support decryption outsourcing and multikeyword search; our VMKS-ABE scheme in cloud storage supports both encryption and decryption outsourcing as well as multi-keyword search.…”
Section: Performance Analysismentioning
confidence: 99%
“…The results are showed in Table 3, which E represents the exponentiation operation in the calculation, P represents the pair operation in the calculation, n is the number of attributes of the user, L the number of attributes in the policy, and j the number of keywords in the middle of encryption, j represents the number of keywords in search. From table 3 we can see in the private key generation phase, the amount of calculation increases linearly with the number of attributes of the user; in the encryption phase, [26], [37], [38] does not support encryption outsourcing, and their calculation amount grows linearly with the number of attributes in the access policy.…”
Section: Performance Analysismentioning
confidence: 99%
“…It also supported user revocation but only achieved selective security. An adaptively secure multiauthority CP-ABE scheme with verifiable outsourced decryption was given in [35].…”
Section: Related Workmentioning
confidence: 99%
“…Threshold access structure is used in this scheme, and the receiver can decrypt the ciphertext of the sender only if the receiver's attribute set and the sender's property set similarity are greater than or equal to a threshold value. Previous works divided attribute‐based encryption (ABE) mechanism into two parts: key‐policy attribute‐based encryption (KP‐ABE) and ciphertext‐policy attribute‐based encryption (CP‐ABE). In KP‐ABE, the access control policy exists in the key and the attribute set is contained in the ciphertext.…”
Section: Introductionmentioning
confidence: 99%