2009
DOI: 10.4134/bkms.2009.46.4.803
|View full text |Cite
|
Sign up to set email alerts
|

On Multi-Authority Ciphertext-Policy Attribute-Based Encryption

Abstract: Abstract. In classical encryption schemes, data is encrypted under a single key that is associated with a user or group. In Ciphertext-Policy Attribute-Based Encryption(CP-ABE) keys are associated with attributes of users, given to them by a central trusted authority, and data is encrypted under a logical formula over these attributes. We extend this idea to the case where an arbitrary number of independent parties can be present to maintain attributes and their corresponding secret keys. We present a scheme f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
47
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 83 publications
(47 citation statements)
references
References 14 publications
0
47
0
Order By: Relevance
“…As the keys need some storage space it would make sense to have only one key per sensor node and the different companies just issue new properties to be used on a node, which they can then use with their scopes and tasks. There are publications in this direction, like [88], but they impose much more computational load than the architecture described here and therefore are currently not feasible. Therefore, here a single trusted authority is assumed with a common set of properties that can be issued to the sensor nodes.…”
Section: Revocation Algorithmmentioning
confidence: 99%
“…As the keys need some storage space it would make sense to have only one key per sensor node and the different companies just issue new properties to be used on a node, which they can then use with their scopes and tasks. There are publications in this direction, like [88], but they impose much more computational load than the architecture described here and therefore are currently not feasible. Therefore, here a single trusted authority is assumed with a common set of properties that can be issued to the sensor nodes.…”
Section: Revocation Algorithmmentioning
confidence: 99%
“…For a good, though somewhat dated, survey see [3]. There are several CP-ABE schemes [10,13,23,2], but only [14], which we modify in this paper, and [24] support policy hiding.…”
Section: Related Workmentioning
confidence: 99%
“…several attribute based encoding schemes having multiple authorities have been projected later [7]- [10], however they either additionally use a threshold-based ABE [7], or have a semi-honest central authority [8]- [10] haphazardly several users' collusion attack [7]. The work by Lewko et al [11] and Muller et al [12] square measure the most similar ones to in this they additionally tried to alter the central authority within the CP-ABE into multiple ones. Lewko et al use a LSSS matrix as AN access structure, but their scheme solely converts the AND, OR gates to the LSSS matrix, which limits their encoding policy to Boolean formula, while we inherit the flexibleness of the access tree having threshold gates.…”
Section: IImentioning
confidence: 99%