2011
DOI: 10.1109/tpds.2010.203
|View full text |Cite
|
Sign up to set email alerts
|

Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
317
3

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 517 publications
(320 citation statements)
references
References 8 publications
0
317
3
Order By: Relevance
“…Recently, several attribute revocable ABE schemes have been announced [2,3,4]. Undoubtedly, these approaches have two main problems, which consists of security degradation in terms of the backward and forward security [1,5]. In the previous schemes, the key authority periodically announce a key update, that will lead to a bottleneck for the key authority.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Recently, several attribute revocable ABE schemes have been announced [2,3,4]. Undoubtedly, these approaches have two main problems, which consists of security degradation in terms of the backward and forward security [1,5]. In the previous schemes, the key authority periodically announce a key update, that will lead to a bottleneck for the key authority.…”
Section: Related Workmentioning
confidence: 99%
“…However, achieving fine-grained user access control failed. Junbeom et al [1] proposed a CP-ABE scheme with fine-grained attribute revocation with the help of the honest-but-curious proxy deployed in the data service provider.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Most ABE schemes enforce monotone access policies over encrypted data [6,13,15,17,22,23,29]. An ABE scheme allows a user to encrypt data into ciphertexts according to a policy.…”
Section: Introductionmentioning
confidence: 99%
“…Yu et al [29] proposed a revocable ABE scheme for revoking a user immediately. In contrast, Hur and Noh [17] proposed a revocable ABE scheme with immediate attribute and user revocation capability. Sahai et al [22] proposed the revocable storage ABE scheme that deals with the issue of efficiently preventing a revoked user from decrypting previously encrypted data.…”
Section: Introductionmentioning
confidence: 99%