2019
DOI: 10.1007/978-3-030-36033-7_4
|View full text |Cite
|
Sign up to set email alerts
|

Attribute Based Encryption for Deterministic Finite Automata from $$\mathsf{DLIN}$$

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(2 citation statements)
references
References 52 publications
0
2
0
Order By: Relevance
“…As noted earlier in the introduction, our unbounded-slot notion is closely related to uniform models of computation with unbounded input lengths, such as ABE and FE for DFA and NFA [41,24,9,10]. At a very high level, our construction may be viewed as following the paradigm in [9,10] for building ABE/FE for uniform models of computation by "stitching" together ABE/FE for the smaller step functions; in our setting, the linear relation between the step functions and the overall computation makes "stitching" much simpler. The way we use two copies of the one-slot scheme is also analogous to the "two-slot, interweaving dual system encryption" argument used in the previous ABE for DFA from k-Lin in [24], except our implementation is simpler and more modular.…”
Section: Discussionmentioning
confidence: 99%
“…As noted earlier in the introduction, our unbounded-slot notion is closely related to uniform models of computation with unbounded input lengths, such as ABE and FE for DFA and NFA [41,24,9,10]. At a very high level, our construction may be viewed as following the paradigm in [9,10] for building ABE/FE for uniform models of computation by "stitching" together ABE/FE for the smaller step functions; in our setting, the linear relation between the step functions and the overall computation makes "stitching" much simpler. The way we use two copies of the one-slot scheme is also analogous to the "two-slot, interweaving dual system encryption" argument used in the previous ABE for DFA from k-Lin in [24], except our implementation is simpler and more modular.…”
Section: Discussionmentioning
confidence: 99%
“…One limitation is that the scheme does not consider that different attributes in the access policy are at different levels of importance, i.e., the attributes do not carry reasonable weights. Waters [19] and Agrawal et al [20] proposed ABE schemes that support arbitrary length input and provide a general ABE structure. In these schemes, the management of attribute universe and key generation are only implemented by a single attribute authority.…”
Section: Related Workmentioning
confidence: 99%