2019
DOI: 10.1155/2019/8093578
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption with User Revocation

Abstract: Attribute-Based Encryption (ABE) must provide an efficient revocation mechanism since a user’s private key can be compromised or expired over time. The existing revocable ABE schemes have the drawbacks of heavy computational costs on key updates and encryption operations, which make the entities for performing these operations a possible bottleneck in practice applications. In this paper, we propose an efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption with user Revocation (R-CP-ABOOE). We i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…ABE, which is introduced by Sahai and Waters, achieves fine-grained access control for outsourced data [16]. ere are two variants of ABE: key-policy attribute-based encryption (KP-ABE) where the decryption key is associated with the access control policy (e.g., [17][18][19]) and ciphertext-policy attributebased encryption (CP-ABE) where the ciphertext is associated with the access control policy (e.g., [20][21][22]). In 2017, Zhu et al presented a key-policy attribute-based encryption with equality test, which can be utilized to do the set intersection over outsourced encrypted data set of one element.…”
Section: Related Workmentioning
confidence: 99%
“…ABE, which is introduced by Sahai and Waters, achieves fine-grained access control for outsourced data [16]. ere are two variants of ABE: key-policy attribute-based encryption (KP-ABE) where the decryption key is associated with the access control policy (e.g., [17][18][19]) and ciphertext-policy attributebased encryption (CP-ABE) where the ciphertext is associated with the access control policy (e.g., [20][21][22]). In 2017, Zhu et al presented a key-policy attribute-based encryption with equality test, which can be utilized to do the set intersection over outsourced encrypted data set of one element.…”
Section: Related Workmentioning
confidence: 99%
“…This technique allows the data users with appropriate attributes to decrypt the ciphertexts under an access structure. There are two types of ABE: ciphertext-policy ABE (CP-ABE) in which the ciphertext is generated under an access structure (e.g., [16,17]) and key-policy ABE (KP-ABE) in which the private key is generated under an access structure (e.g., [18,19]). ABE also can be combined with other techniques to provide fine-grained operation and computation, e.g., attribute-based keyword search (e.g., [20]) or attribute-based proxy re-encryption (e.g., [21]).…”
Section: Attribute-based Encryption (Abe)mentioning
confidence: 99%
“…Then an advanced version that against decryption key exposure was constructed by Seo and Emura [22]. After that, in order to obtain an efficient and secure revocation mechanisms, a series of works have been studied in both IBE and ABE setting in [23]- [31]. Especially, Hur and Noh [26] provided an elegant technique for fine-grained level revocation by using selective group key distribution method.…”
Section: B Related Workmentioning
confidence: 99%