2016
DOI: 10.1002/sec.1593
|View full text |Cite
|
Sign up to set email alerts
|

Group‐oriented encryption for dynamic groups with constant rekeying cost

Abstract: In group‐oriented encryption, a sender encrypts a message and sends it to a set of users, which form a group. Encryption is carried out using the group's public key. Only the legitimate group users are capable of decrypting the ciphertext using their individual private keys. Existing literature in group‐oriented encryption schemes considers only static groups in secure group communication. Extension of the existing schemes to support dynamic groups results in the one‐affects‐all problem. We propose a group‐ori… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
35
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(35 citation statements)
references
References 23 publications
0
35
0
Order By: Relevance
“…Then, CA generates a public key, PKCA=false{normalh=gβ,normalf=g1false/βfalse}, and a secret key, SK CA = { β }, where βZp is a randomly selected exponent. The CA publishes the public parameter, PK as PK = false{G0,normalg,normalh=gβ,normalf=g1false/βfalse}.In our scheme, CA works as a group coordinator (GC) for readers and writers and generates master secret key MSK grp and system parameter Γ using Nishat's scheme false{SKAAi,PKAAifalse}: Each AAiscriptA creates a secret key, SKAAi = ( α i , gαi), and a public key, PKAAi = false{normalefalse(normalg,normalgfalse)αifalse}, where α i is selected randomly from Zp.…”
Section: Proposed Access Control Schemementioning
confidence: 99%
See 4 more Smart Citations
“…Then, CA generates a public key, PKCA=false{normalh=gβ,normalf=g1false/βfalse}, and a secret key, SK CA = { β }, where βZp is a randomly selected exponent. The CA publishes the public parameter, PK as PK = false{G0,normalg,normalh=gβ,normalf=g1false/βfalse}.In our scheme, CA works as a group coordinator (GC) for readers and writers and generates master secret key MSK grp and system parameter Γ using Nishat's scheme false{SKAAi,PKAAifalse}: Each AAiscriptA creates a secret key, SKAAi = ( α i , gαi), and a public key, PKAAi = false{normalefalse(normalg,normalgfalse)αifalse}, where α i is selected randomly from Zp.…”
Section: Proposed Access Control Schemementioning
confidence: 99%
“…The data owner signs CT Vk and CT Sk using Sk and sends CT Vk , CT Sk , σ Vk , and σ Sk to the cloud server . The data owner also sends T read and T write to the CA. GroupPubKeyGen (Γ, T read , T write ) →{PK r , δ r , false{SKurfalse}normaluUreader, PK w , δ w , false{SKuwfalse}normaluUwriterfalse}: We use Nishat's scheme to generate public keys for a group of readers and writers , respectively. The CA receives T read , T write from the data owner and then receives membership information (a list of users possessing a particular attribute) for each attribute in the access policies from the corresponding attribute authorities, similarly to the Hur scheme .…”
Section: Proposed Access Control Schemementioning
confidence: 99%
See 3 more Smart Citations