2015
DOI: 10.1007/978-3-319-24177-7_13
|View full text |Cite
|
Sign up to set email alerts
|

Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key

Abstract: Attribute Based Broadcast Encryption (ABBE) is a combination of Attribute Based Encryption (ABE) and Broadcast Encryption (BE). It allows a broadcaster (or encrypter) to broadcast an encrypted message that can only be decrypted by the receivers who are within a predefined user set and satisfy the access policy specified by the broadcaster. Compared with normal ABE, ABBE allows direct revocation, which is important in many real-time broadcasting applications such as Pay TV. In this paper, we propose two novel A… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
18
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(18 citation statements)
references
References 20 publications
0
18
0
Order By: Relevance
“…in [15], the extension of Boneh‐Gentry‐Waters (BGW) technique to ABBE setting makes the secret key longer, due to the obligation of combining different attributes in the decryption, as shown in [7]. The problem of designing constant‐size private key ABBE schemes supporting fine‐grained access control was partially solved in ESORICS ‘15 [16]. However, the problem is still open since the proposed non‐monotonic scheme only manages restrictive access policies supporting AND‐gates and wildcards: they do not treat the case of CNF or DNF forms.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…in [15], the extension of Boneh‐Gentry‐Waters (BGW) technique to ABBE setting makes the secret key longer, due to the obligation of combining different attributes in the decryption, as shown in [7]. The problem of designing constant‐size private key ABBE schemes supporting fine‐grained access control was partially solved in ESORICS ‘15 [16]. However, the problem is still open since the proposed non‐monotonic scheme only manages restrictive access policies supporting AND‐gates and wildcards: they do not treat the case of CNF or DNF forms.…”
Section: Introductionmentioning
confidence: 99%
“…Overall, even though extensively studied in the recent years with many ABBE schemes have been proposed [7, 14, 16, 24–28] to name a few, and one of the challenges is to design a CPABBE scheme which achieves simultaneously the constant‐size secret key, efficient ciphertext size, fine‐grained access policy and fast decryption.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…This scheme is restricted therein it allows an authority merely to issue private keys expressing threshold policies. Since then, several works [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17] proposed different ABE systems and applications, among which two worksare remarkable. Goyal et al [6] propounded a fine-grained access constraint for attribute-based encryption.…”
Section: Introductionmentioning
confidence: 99%