Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security 2011
DOI: 10.1145/1966913.1966964
|View full text |Cite
|
Sign up to set email alerts
|

Multi-authority ciphertext-policy attribute-based encryption with accountability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
107
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 136 publications
(107 citation statements)
references
References 9 publications
0
107
0
Order By: Relevance
“…Besides the actual fact that we are able to specific haphazardly general encoding policy, this system additionally tolerates the compromise attack towards attributes authorities, that isn't lined in several existing works. Recently, there additionally appeared traceable multi-authority ABE [13] and [14], that square measure on the other direction of ours. Those schemes introduce responsibility specified malicious users' keys are often derived.…”
Section: IImentioning
confidence: 81%
“…Besides the actual fact that we are able to specific haphazardly general encoding policy, this system additionally tolerates the compromise attack towards attributes authorities, that isn't lined in several existing works. Recently, there additionally appeared traceable multi-authority ABE [13] and [14], that square measure on the other direction of ours. Those schemes introduce responsibility specified malicious users' keys are often derived.…”
Section: IImentioning
confidence: 81%
“…The system is not Security and Communication Networks 3 practical due to infeasible large sizes of public key and ciphertext. Li et al [31] proposed a multiauthority CP-ABE scheme with accountability, which allows tracing the identity of a misbehaving user who leaked the decryption key to others. The system supported AND-gates policy.…”
Section: Related Workmentioning
confidence: 99%
“…Then, the problem of building a secure CP-ABE supporting traceability has recently been studied in [8,12,14,13]. The ciphertext access policies in [8,12] only support a single AND gate with wild-card.…”
Section: Related Workmentioning
confidence: 99%
“…Then, the problem of building a secure CP-ABE supporting traceability has recently been studied in [8,12,14,13]. The ciphertext access policies in [8,12] only support a single AND gate with wild-card. The traceable CP-ABE proposed in [14] is as fully secure, highly expressive and efficient as a conventional CP-ABE such as the one in [11], but it only supports tracing 'well-formed' illegally constructed private keys.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation