2010
DOI: 10.1007/978-3-642-13013-7_2
|View full text |Cite
|
Sign up to set email alerts
|

Constant Size Ciphertexts in Threshold Attribute-Based Encryption

Abstract: Abstract. Attribute-based cryptography has emerged in the last years as a promising primitive for digital security. For instance, it provides good solutions to the problem of anonymous access control. In a ciphertextpolicy attribute-based encryption scheme, the secret keys of the users depend on their attributes. When encrypting a message, the sender chooses which subset of attributes must be held by a receiver in order to be able to decrypt.All current attribute-based encryption schemes that admit reasonably … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
200
0
2

Year Published

2011
2011
2019
2019

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 182 publications
(202 citation statements)
references
References 23 publications
0
200
0
2
Order By: Relevance
“…[BBG05] provides an intractability bound for the general Diffie-Hellman exponent problem in the generic model [Sho97], where the underlying groups are equipped with pairings. Thus the generic complexity of (n, t)-MSE-DDH and the other similar problems mentioned in [DPP07,HLR10,DP08] are covered by the analysis in [BBG05]. A proof to show the (n, t)-MSE-DDH problem as a particular instance of general Diffie-Hellman exponent problem is similar to the proof of [DP08], where it has been shown that the (l, m, t)-MSE-DDH (l, m, t are integers) problem fit the framework of general Diffie-Hellman exponent problem.…”
Section: (N T)-mse-ddh (The Multi-sequence Of Exponentsmentioning
confidence: 98%
See 1 more Smart Citation
“…[BBG05] provides an intractability bound for the general Diffie-Hellman exponent problem in the generic model [Sho97], where the underlying groups are equipped with pairings. Thus the generic complexity of (n, t)-MSE-DDH and the other similar problems mentioned in [DPP07,HLR10,DP08] are covered by the analysis in [BBG05]. A proof to show the (n, t)-MSE-DDH problem as a particular instance of general Diffie-Hellman exponent problem is similar to the proof of [DP08], where it has been shown that the (l, m, t)-MSE-DDH (l, m, t are integers) problem fit the framework of general Diffie-Hellman exponent problem.…”
Section: (N T)-mse-ddh (The Multi-sequence Of Exponentsmentioning
confidence: 98%
“…This idea is very prominent in threshold cryptography, e.g., broadcast encryption, threshold encryption, attribute based encryption etc. The approach for our scheme is inspired by the work of [DPP07,HLR10,DP08]. An overview of this idea can briefly be described as follows:…”
Section: The New (T N)-threshold Pvss Schemementioning
confidence: 99%
“…Because of the popularity of lightweight devices and useful applications of secure attribute based system with short ciphertext' , in this work, we propose a probably secure proposed system scheme that offers short decryption keys, which are applicable for key storage in lightweight devices. [17], [18], [19] CP-ABE works under four ways Setup, Encrypt KeyGen and decrypt.…”
Section: Proposed Systemmentioning
confidence: 99%
“…Several ABE schemes [3,7,11] with constant-size ciphertexts have been proposed. Among them, [7,11] only support limited classes of predicates that do not cover the classes supported by ZIPE or NIPE, while [3] supports a wider class of relations, non-monotone predicates, than those by ZIPE or NIPE.…”
Section: Related Workmentioning
confidence: 99%
“…Among them, [7,11] only support limited classes of predicates that do not cover the classes supported by ZIPE or NIPE, while [3] supports a wider class of relations, non-monotone predicates, than those by ZIPE or NIPE. All of these ABE schemes, however, are only selectively secure in the standard model.…”
Section: Related Workmentioning
confidence: 99%