DOI: 10.1007/978-3-540-70583-3_47
|View full text |Cite
|
Sign up to set email alerts
|

Bounded Ciphertext Policy Attribute Based Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
226
0
6

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 388 publications
(232 citation statements)
references
References 11 publications
0
226
0
6
Order By: Relevance
“…To overcome this weakness, Cheung and Newport [3] presented another construction that is proved to be secure under the standard model. Then, Goyal et al [4] presented another construction for more advanced access structures based on number theoretic assumption. Katz, Sahai, and Waters [10] proposed a novel predicate encryption scheme supporting inner product predicates.…”
Section: Related Workmentioning
confidence: 99%
“…To overcome this weakness, Cheung and Newport [3] presented another construction that is proved to be secure under the standard model. Then, Goyal et al [4] presented another construction for more advanced access structures based on number theoretic assumption. Katz, Sahai, and Waters [10] proposed a novel predicate encryption scheme supporting inner product predicates.…”
Section: Related Workmentioning
confidence: 99%
“…The ciphertext can be decrypted with the decryption key if and only if the attribute set of ciphertext satisfies the access structure of decryption key. [12], [27] CP-ABE: In a CP-ABE scheme, on the contrary, the ciphertext encrypts a message with an access structure while a decryption key is associated with a set of attributes. The decryption condition is similar: if and only if the attribute set fulfils the access structure [14].…”
Section: Kp-abementioning
confidence: 99%
“…Selective security is weaker than adaptive security, requiring the adversary to commit ahead of time to the challenge point a, which is analogous to the selective security notion often adopted in IdentityBased Encryption (IBE) [7], Attribute-Based Encryption (ABE) [22], Functional Encryption (FE) [35] and Predicate Encryption (PE) [8]. The detailed selective security definition is described in Definition 6 in the Appendix.…”
Section: Bilinear Groups and Computational Assumptionmentioning
confidence: 99%