2014 IEEE International Conference on Communications Workshops (ICC) 2014
DOI: 10.1109/iccw.2014.6881280
|View full text |Cite
|
Sign up to set email alerts
|

Key-Policy Weighted Attribute based Encryption for fine-grained access control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 14 publications
0
13
0
Order By: Relevance
“…In a traditional KP-ABE method, the characteristics of specified attributes have been treated at the same level. In real environment applications, each attribute has a different weight according to its significance [1]. In present days, web technology has become faster and stronger.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In a traditional KP-ABE method, the characteristics of specified attributes have been treated at the same level. In real environment applications, each attribute has a different weight according to its significance [1]. In present days, web technology has become faster and stronger.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [29], with the case of the personal health record, Li et al realized the security and scalable and fine-grained access control, supporting the modification of access policies and revocation of attributes. Liu et al assumed that each attribute had different importance and constructed schemes that supported the access structure with different weights in CP-ABE [30] and KP-ABE [31]. Liu et al added traceability to an existing expressive, efficient, and secure CP-ABE scheme without weakening its security, and change in the length of Mobile Information Systems 3 the ciphertext and decryption key does not cause too much overhead [32].…”
Section: Related Workmentioning
confidence: 99%
“…A consumer can decrypt a ciphertext if and only if his/her secret key has a match with the ciphertext. Weighted attribute-based encryption [16][17][18][19][20][21] is a variant of ABE. It assigns different weights to attributes according to their importance.…”
Section: Introductionmentioning
confidence: 99%