2012
DOI: 10.6109/jicce.2012.10.1.053
|View full text |Cite
|
Sign up to set email alerts
|

Attribute-based Proxy Re-encryption with a Constant Number of Pairing Operations

Abstract: Attribute-based encryption (ABE) is an encryption scheme in which the user is able to decrypt a ciphertext with associated attributes. However, the scheme does not offer the capability of decryption to others when the user is offline. For this reason, the attribute-based proxy re-encryption (ABPRE) scheme was proposed, which combines traditional proxy re-encryption with ABE, so a user is able to empower designated users to decrypt the re-encrypted ciphertext with the associated attributes of designated users. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(23 citation statements)
references
References 15 publications
0
23
0
Order By: Relevance
“…Compared with [6], it has a new property named reencryption control which means that the user can decide which ciphertext can be reencrypted later during the encryption process. Later, Seo and Kim [8] presented another CP-ABPRE scheme which only needs a constant number of bilinear pairing operations. So the computation cost and ciphertext length are reduced significantly compared to previous schemes [7,27].…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Compared with [6], it has a new property named reencryption control which means that the user can decide which ciphertext can be reencrypted later during the encryption process. Later, Seo and Kim [8] presented another CP-ABPRE scheme which only needs a constant number of bilinear pairing operations. So the computation cost and ciphertext length are reduced significantly compared to previous schemes [7,27].…”
Section: Related Workmentioning
confidence: 99%
“…(1) A new scheme is proposed and it overcomes the restriction on the attacker in a selective security model in the existing schemes [6][7][8][9]11] and is proved to be adaptively secure. (2) Our proposal supports any monotone access formulas including what the AND gate access structure supports.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations