2015
DOI: 10.1007/978-3-319-21966-0_20
|View full text |Cite
|
Sign up to set email alerts
|

Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…We regard this as the third key benefit of our proposal-the decryption capability split mechanism in our proposal allows the delegatee to maintain the secrecy of his/her secret, without the need to reveal it to the entity performing the decryption split. We remark that the method for delegating the workload of ABE decryption in [40,41] could also be applied to realize cloud-enabled user revocation, but this will result in decryption key split.…”
Section: Benefitsmentioning
confidence: 99%
“…We regard this as the third key benefit of our proposal-the decryption capability split mechanism in our proposal allows the delegatee to maintain the secrecy of his/her secret, without the need to reveal it to the entity performing the decryption split. We remark that the method for delegating the workload of ABE decryption in [40,41] could also be applied to realize cloud-enabled user revocation, but this will result in decryption key split.…”
Section: Benefitsmentioning
confidence: 99%
“…If an attribute of the system is removed, then the latest attribute will be stopped, when all users' keys are updated, the relevant attributes are not released. However, the encryption party needs to negotiate with the agency in the key update phase, users interacts with the agency online, the attribute cannot be revoked before the expiration time [32].…”
Section: B Revocation Mechanismmentioning
confidence: 99%
“…Other than dealing with authenticated access on encrypted information in cloud storage service [13][14][15][16][17][18], ABE can likewise be utilized for get to control to distributed computing administration, correspondingly as an encryption plan can be utilized for verification reason: The cloud server may encode an irregular message utilizing the get to strategy and request that the client unscramble. On the off chance that the client can effectively unscramble the ciphertext (which implies the client's characteristics set fulfills the endorsed strategy), then it is permitted to get to the distributed computing administration.…”
Section: Attribute-based Cryptosystemmentioning
confidence: 99%
“…On the off chance that the SEM does not participate then no exchanges with the general population key are conceivable any more. Recently, an attribute-based version of SEM was proposed in [13].…”
Section: Access Control With Security Devicementioning
confidence: 99%
See 1 more Smart Citation