Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security 2012
DOI: 10.1145/2414456.2414465
|View full text |Cite
|
Sign up to set email alerts
|

Expressive CP-ABE with partially hidden access structures

Abstract: In a traditional ciphertext-policy attribute-based encryption (CP-ABE) scheme, an access structure, also refereed to as ciphertext-policy, is sent along with a ciphertext explicitly, and anyone who obtains a ciphertext can know the access structure associated with the ciphertext. In certain applications, access structures contain sensitive information and must be protected from everyone except the users whose private key attributes satisfy the access structures.In this paper, we first propose a new model for C… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
126
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 160 publications
(126 citation statements)
references
References 31 publications
0
126
0
Order By: Relevance
“…In Table 1, we compare the user's private key size, ciphertext size, public key size, and computational cost used in the whole system with those in [8][9][10]. Compared to [8], the user's private key size is the same, the ciphertext size is increased by the bit size of an element in G 1 because 1 ( , ) is embedded into it, and the public key size is increased by the bit size of an element in G 0 because PK SDS = is used as one of the public keys in the system.…”
Section: Extra Costs Due To the Sds Constraint And Comparisonmentioning
confidence: 99%
See 2 more Smart Citations
“…In Table 1, we compare the user's private key size, ciphertext size, public key size, and computational cost used in the whole system with those in [8][9][10]. Compared to [8], the user's private key size is the same, the ciphertext size is increased by the bit size of an element in G 1 because 1 ( , ) is embedded into it, and the public key size is increased by the bit size of an element in G 0 because PK SDS = is used as one of the public keys in the system.…”
Section: Extra Costs Due To the Sds Constraint And Comparisonmentioning
confidence: 99%
“…Compared to [8][9][10], our scheme has an extra network communication cost per data object if the data object is under an SDS constraint. The proxy server sends the partially decrypted ciphertext to the SDS monitor, and the SDS monitor sends the further partially decrypted ciphertext to the user.…”
Section: Extra Costs Due To the Sds Constraint And Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…Early ABE schemes reveal the access policy of ciphertexts to everyone, which might be sensitive. Anonymous ABE [33,39] is then proposed.…”
Section: Attribute-based Encryptionmentioning
confidence: 99%
“…For example, the size of public key and ciphertext in the first anonymous ABE scheme [39] are both linear in the size of the attribute domain U, and it only supports limited form of policies. The scheme of Lai et al [33] supports linear secret sharing scheme (LSSS) (see Def. 1) based policy, yet they sacrifice anonymity to some extent.…”
Section: Attribute-based Encryptionmentioning
confidence: 99%