2018
DOI: 10.1007/978-3-030-00012-7_47
|View full text |Cite
|
Sign up to set email alerts
|

Attribute-Based Encryption Scheme Supporting Tree-Access Structure on Ideal Lattices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
10
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…Since the encrypted data can be compared in distance, the ASPE scheme can support kNN query processing. However, this scheme is vulnerable to selective plaintext attack 31 and data leakage. Man et al 10 proposed an encryption transformation (CRT) scheme, which uses AES encrypted R‐tree index to support kNN query processing.…”
Section: Related Workmentioning
confidence: 99%
“…Since the encrypted data can be compared in distance, the ASPE scheme can support kNN query processing. However, this scheme is vulnerable to selective plaintext attack 31 and data leakage. Man et al 10 proposed an encryption transformation (CRT) scheme, which uses AES encrypted R‐tree index to support kNN query processing.…”
Section: Related Workmentioning
confidence: 99%
“…The decryption run time and integrity support features are based on chosen cipher-text security. In 2018, authors of [16] proposed the attribute-based encryption scheme supporting tree-access structure from ideal lattices. They used an expressive and flexible access policy by Shamir threshold secret sharing technology, including "and", "or", and "threshold" operations.…”
Section: Introductionmentioning
confidence: 99%
“…Zhao and Gao [46] enhanced LSSS in supporting the access structure of the KP-ABE scheme; however, the number of secret keys increased exponentially. Yu et al [47] extended tree structure to support AND, OR and threshold gates as LSSS matrix in the KP-ABE scheme. Liu et al [48] extended KP-ABE in a keywordsearchable context, whereas Liu et al [49] focused on addressing the leakage of shared master keys in LSSS.…”
mentioning
confidence: 99%
“…Pal and Dutta [51] further extended the KP-ABE scheme in supporting functional encryption. Generally, the algorithm design of recent quantum-resistant KP-ABE schemes [24,[41][42][43][44][45][46][47][48][49][50][51] is mainly directed at lattice-based cryptography, which offers security proofs based on NP-hard problems with average-case to worst-case hardness. Moreover, the inherent linear algebra-based matrix or vector operations make lattice-based ABE can be implemented efficiently [15].…”
mentioning
confidence: 99%
See 1 more Smart Citation