2016
DOI: 10.1007/978-3-319-47422-9_2
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
52
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 57 publications
(52 citation statements)
references
References 23 publications
0
52
0
Order By: Relevance
“…Since literature [ 32 35 ] do not support multi-keyword search function, the proposed scheme is mainly compared with literature [ 31 ]. From the Fig 2 , we can see that in the encryption phase, the calculation speed of our scheme is slower than literature [ 33 ], faster than literature [ 31 , 32 , 34 , 35 ].…”
Section: Performance and Efficiency Analysesmentioning
confidence: 86%
See 1 more Smart Citation
“…Since literature [ 32 35 ] do not support multi-keyword search function, the proposed scheme is mainly compared with literature [ 31 ]. From the Fig 2 , we can see that in the encryption phase, the calculation speed of our scheme is slower than literature [ 33 ], faster than literature [ 31 , 32 , 34 , 35 ].…”
Section: Performance and Efficiency Analysesmentioning
confidence: 86%
“…In Fig 3(D), 3(E) and 3(F) are time charts for running token generation algorithm as the number of attributes increases when keyword set contains 10, 20, and 30 keywords, respectively. Since literature [ 32 , 34 , 35 ] does not involve token generation algorithm, at this phase, our scheme is mainly compared with literature [ 31 , 33 ], and because literature [ 33 ] does not support multi-keyword search function, the changes in the number of keywords will only lead to changes in the algorithm time of our scheme and literature [ 31 ]. As can be seen from the Fig 3 , when the number of keywords is 10, the calculation time of our scheme is shortest.…”
Section: Performance and Efficiency Analysesmentioning
confidence: 99%
“…So Zhang et al [28] proposed a scheme with decryption test in 2013, namely, adding a matching operation with less computation before decryption phase. The [29] proposed an anonymous scheme based on a prime order group. In 2016, the [30] extended the ANON-CP-ABE to the electronic medical record system to protect the users privacy, in which the access structure was more expressive.…”
Section: A Related Workmentioning
confidence: 99%
“…The [32] proposed an ANON-CP-ABE scheme that supports fast decryption for Personal Health Record (PHR). The core technology of [29], [30], [32] is to disclose the index of attribute names and the attribute values are embed into access structures, so these schemes only can partially hide the access policies.…”
Section: A Related Workmentioning
confidence: 99%
“…As shown in Table. 3, schemes [6,24,25] restricted with AND-gates on multivalues give rise to an exponential size of ciphertext for supporting an expressive access policy. Since the attribute value is hidden in [28], for finding the correct attribute value for successful decryption, [28] needs end user to test super-polynomial times. In addition, all the above schemes only protect the privacy attribute value, but expose the information of attribute name.…”
Section: Complexity Analysismentioning
confidence: 99%