2015
DOI: 10.1109/tc.2013.200
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
86
0
1

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 129 publications
(87 citation statements)
references
References 25 publications
0
86
0
1
Order By: Relevance
“…Concluded that finger print based biometrics will be more accurate and affordable among all the biometric techniques, as it doesn't match between individuals and doesn't change with age. So, decided to use finger prints in future work on biometrics, extracting minutiae points from finger prints of a single or multiple users to build access policy and encrypt text or image file using CP-ABE [3], [4], [5]. …”
Section: Conclusionand Future Scopementioning
confidence: 99%
“…Concluded that finger print based biometrics will be more accurate and affordable among all the biometric techniques, as it doesn't match between individuals and doesn't change with age. So, decided to use finger prints in future work on biometrics, extracting minutiae points from finger prints of a single or multiple users to build access policy and encrypt text or image file using CP-ABE [3], [4], [5]. …”
Section: Conclusionand Future Scopementioning
confidence: 99%
“…In this section, the previous CP-ABE schemes [1,2,6,8,9,12,13,24,26,28] with constant-size ciphertexts and the proposed scheme are compared from the aspects of security and efficiency. The ciphertext size of schemes [1,2,6,8,9,12,13,24,28] and ours is 2|G| + |G T | and that of scheme [26] is |G| + |G T |.…”
Section: Performance Analysismentioning
confidence: 99%
“…The ciphertext size of schemes [1,2,6,8,9,12,13,24,28] and ours is 2|G| + |G T | and that of scheme [26] is |G| + |G T |. In Table 4, performance comparisons are made in terms of the attribute private key size, the size of system public key and master key, the computation overheads of encryption and decryption, the expressiveness of access policy, the adopted security model, and assumptions.…”
Section: Performance Analysismentioning
confidence: 99%
See 2 more Smart Citations