2010
DOI: 10.1016/j.ins.2010.01.008
|View full text |Cite
|
Sign up to set email alerts
|

Hidden attribute-based signatures without anonymity revocation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
48
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 130 publications
(48 citation statements)
references
References 21 publications
0
48
0
Order By: Relevance
“…Multi-User Searchable Encryption (MUSE) Multi-User Searchable Encryption (MUSE) technique was focused in some recent work [8], [9], [10], [11], [14], while to reach the objective these all adopted single key integrated with access control. In [7], [14], multi-user searchable encryption system are constructed to achieve coarse-grained access control by using broadcast encryption and documents were shared by sending searchable encryption key to all users who can access it.…”
Section: Review Of Literaturementioning
confidence: 99%
See 1 more Smart Citation
“…Multi-User Searchable Encryption (MUSE) Multi-User Searchable Encryption (MUSE) technique was focused in some recent work [8], [9], [10], [11], [14], while to reach the objective these all adopted single key integrated with access control. In [7], [14], multi-user searchable encryption system are constructed to achieve coarse-grained access control by using broadcast encryption and documents were shared by sending searchable encryption key to all users who can access it.…”
Section: Review Of Literaturementioning
confidence: 99%
“…In [7], [14], multi-user searchable encryption system are constructed to achieve coarse-grained access control by using broadcast encryption and documents were shared by sending searchable encryption key to all users who can access it. Attribute Based Encryption (ABE) is applied in [8], [9], [10], [11], [12], [13] to achieve searching keyword using fine-grained access control. However now in multi-user searchable encryption, control over which document can be accessed by which user is the main problem.…”
Section: Review Of Literaturementioning
confidence: 99%
“…In this notion [2][3][4] [7], an attribute structure is embedded into each user's private key, a signer is capable of creating a signature using the private key he owns, while a verifier can verify the signature using system parameters. Existing literatures have tackled certain issues in ABS such as user traceability [12] [17], user flexible revocation [5] [12], signature with multi-authorities, etc. At the meantime, ABS is widely implemented for providing data authentication [6] in mobile networks.…”
Section: Introductionmentioning
confidence: 99%
“…Similar to the technique in [2], the PHR users in the sharing system in [5] are divided into multiple security domains, which greatly reduces the complexity of key management for PHR owners and PHR users. To guarantee patient privacy, multi-authority ABE [6] are exploited in [5,13]. Lu et al [7] proposed a secure and privacy-preserving opportunistic computing framework for mobile healthcare emergency.…”
Section: Introductionmentioning
confidence: 99%