2019
DOI: 10.1093/comjnl/bxz036
|View full text |Cite
|
Sign up to set email alerts
|

Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification

Abstract: Thanks to the ease of access and low expenses, it is now popular for people to store data in cloud servers. To protect sensitive data from being leaked to the outside, people usually encrypt the data in the cloud. However, management of these encrypted data becomes a challenging problem, e.g. data classification. Besides, how to selectively share data with other users is also an important and interesting problem in cloud storage. In this paper, we focus on ciphertext-policy attribute based encryption with equa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 17 publications
0
12
0
Order By: Relevance
“…To make the result more universal and credible, we independently set the test times as 500, 1000, 2000 and 4000. Figure 3(a), 3(b), 3(c), 3(d) show us that our CP-ABEET is more efficient than scheme in [10] in Test algorithm, and the efficiency of KeyGen, Enc and Dec algorithm is similar with that in [10]. As the number of tests increases, the running time increases linearly.…”
Section: Efficiency Evaluationmentioning
confidence: 73%
See 3 more Smart Citations
“…To make the result more universal and credible, we independently set the test times as 500, 1000, 2000 and 4000. Figure 3(a), 3(b), 3(c), 3(d) show us that our CP-ABEET is more efficient than scheme in [10] in Test algorithm, and the efficiency of KeyGen, Enc and Dec algorithm is similar with that in [10]. As the number of tests increases, the running time increases linearly.…”
Section: Efficiency Evaluationmentioning
confidence: 73%
“…Later, Wang et al [9] proposed a construction of CP-ABEET scheme. Recently, Cui et al [10] proposed another CP-ABEET scheme, which enhances the security of [9]. Then, Cui et al [26] provided another CP-ABEET scheme, which supports to outsource the dominating computations of decryption and equality test to a third-party.…”
Section: A Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Attribute-based encryption (ABE) [8,9] is a promising tool to afford confidentiality and fine-grained access control simultaneously. Generally, ABE schemes can be divided into three categories key-policy ABE (KP-ABE) [10], ciphertext-policy ABE (CP-ABE) [11], and dual-policy ABE (DP-ABE) [12]. In a KP-ABE, a data user's secret-key is associated with an access control policy which is defined by a central authority, and each ciphertext is labeled by a set of attributes.…”
Section: Introductionmentioning
confidence: 99%