2018
DOI: 10.1007/978-3-319-98989-1_25
|View full text |Cite
|
Sign up to set email alerts
|

Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls—Secure and Efficient Fine-Grained Access Control on Corrupted Machines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(23 citation statements)
references
References 24 publications
0
23
0
Order By: Relevance
“…Although diverse ABE schemes can meet the functional requirements of practical applications, the efficiency problem is still a huge challenge, especially for users with limited resources. Currently, a number of mechanisms have been used to improve the practicability of ABE schemes, such as online/offline technology [9], [26], [27] and outsourcing technology [17], [28], [29]. However, their schemes have a common insufficient that the use of bilinear pairing affects its efficiency.…”
Section: Related Workmentioning
confidence: 99%
“…Although diverse ABE schemes can meet the functional requirements of practical applications, the efficiency problem is still a huge challenge, especially for users with limited resources. Currently, a number of mechanisms have been used to improve the practicability of ABE schemes, such as online/offline technology [9], [26], [27] and outsourcing technology [17], [28], [29]. However, their schemes have a common insufficient that the use of bilinear pairing affects its efficiency.…”
Section: Related Workmentioning
confidence: 99%
“…Camenisch, Drijvers and Lehmann [9] consider Direct Anonymous Attestation in the presence of a subverted Trusted Platform Module. Cryptographic reverse firewalls [20,12,19] represent an architecture to counter ASAs via trusted code in network perimeter filters. Fischlin and Mazaheri show how to construct ASA-resistant encryption and signature algorithms given initial access to a trusted base scheme [16].…”
Section: Contributionsmentioning
confidence: 99%
“…Very recently, Chen [2] proposed a new scalable SPHF for instantiating the OSBE protocol with CRF, as well as a new framework that includes the DDHbased OT-CRF structure proposed by Mironov and Stephens-Davidowitz [1] and a new structure generated under the klinear assumption. Ma et al [11] proposed an online/offline ABE scheme with CRF, which motives this work since none of the previous schemes applied reverse firewall to the multiauthority KP-ABE scheme based on a non-monotonic access structure.…”
Section: B Related Workmentioning
confidence: 99%
“…However, there are some applications of CRF deployed in many cryptosystems, but less studied and deployed in Attribute-Based Encryption (ABE) field, this is because deploying CRF protections on ABE schemes seem to incur some additional costs. Very recently, Ma et al [11] borrow the online/offline insight and deploy a CRF protection for an online/offline ABE scheme, where three reverse firewall are used to re-randomize variables in generating keys and ciphertexts. They provide an optimization on the online computation efficiency of the reverse firewalls by splitting the computation for the algorithms in ABE into two phases but not a generic method for deploying CRF into ABE system.…”
Section: Introductionmentioning
confidence: 99%