2017 3rd IEEE International Conference on Computer and Communications (ICCC) 2017
DOI: 10.1109/compcomm.2017.8322780
|View full text |Cite
|
Sign up to set email alerts
|

Hidden policy ciphertext-policy attribute based encryption with conjunctive keyword search

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(21 citation statements)
references
References 6 publications
0
21
0
Order By: Relevance
“…However, the exposed access policy is susceptible to attacks from external adversaries. To address this issue, Sun et al [33] proposed a multi-keyword search ABSE scheme that supports partially hidden policies. However, despite the policy being in a semi-hidden state on the server, there is still a risk of leakage.…”
Section: B Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…However, the exposed access policy is susceptible to attacks from external adversaries. To address this issue, Sun et al [33] proposed a multi-keyword search ABSE scheme that supports partially hidden policies. However, despite the policy being in a semi-hidden state on the server, there is still a risk of leakage.…”
Section: B Related Workmentioning
confidence: 99%
“…According to Table 5, the access policy of the scheme [33] and the scheme proposed in this paper support AND-gates on multi-valued with wildcards, allowing greater expression of access policies compared to the schemes proposed by [14], [17] and [23]. In addition, our scheme implements the fully hidden policy, in which neither the attribute name nor the attribute value are visible to adversaries.…”
Section: A Functionality Comparisonmentioning
confidence: 99%
See 2 more Smart Citations
“…Thus, this compromises policy secrecy. To improve privacy in ABE schemes, [26], [123]- [132] suggested the hiding of access structures. A user only decrypts a ciphertext if her attributes match the policy, and there is no way she can guess the policy included in the ciphertext.…”
Section: ) Hidden Policy Attribute Based Encryptionmentioning
confidence: 99%