Proceedings of the 2013 ACM SIGSAC Conference on Computer &Amp; Communications Security - CCS '13 2013
DOI: 10.1145/2508859.2516672
|View full text |Cite
|
Sign up to set email alerts
|

Practical constructions and new proof methods for large universe attribute-based encryption

Abstract: We propose two large universe Attribute-Based Encryption constructions. In a large universe ABE system any string can be used as an attribute and attributes need not be enumerated at system setup. Our first construction establishes a novel large universe Ciphertext-Policy ABE scheme on prime order bilinear groups, while the second achieves a significant efficiency improvement over the large universe Key-Policy ABE system of Lewko-Waters and Lewko. Both schemes are selectively secure in the standard model under… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
332
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 345 publications
(333 citation statements)
references
References 40 publications
1
332
0
Order By: Relevance
“…Although incomparable to both of them, it contains fewer terms, hence it is relatively weaker. This comes in contrast to the fact that our multi-authority construction supports more features than the two ABE schemes of [40]. The reason of the apparent paradox is the use of the static security and random oracle model in this work versus selective security and standard model in [40].…”
Section: Bilinear Groups and Complexity Assumptionmentioning
confidence: 81%
See 3 more Smart Citations
“…Although incomparable to both of them, it contains fewer terms, hence it is relatively weaker. This comes in contrast to the fact that our multi-authority construction supports more features than the two ABE schemes of [40]. The reason of the apparent paradox is the use of the static security and random oracle model in this work versus selective security and standard model in [40].…”
Section: Bilinear Groups and Complexity Assumptionmentioning
confidence: 81%
“…The assumption is closely related to the two assumptions presented in [40]. Although incomparable to both of them, it contains fewer terms, hence it is relatively weaker.…”
Section: Bilinear Groups and Complexity Assumptionmentioning
confidence: 88%
See 2 more Smart Citations
“…One of straightforward ways of securing digital image transmission is to encrypt the images [23][11] [29]. In image encryption, traditional methods like those of asymmetric encryption in public key systems [6] are often adopted, other methods including image scrambling using Hilberts Space-filling Curves (HSC) [17] as well as image sharing based on Chinese Remainder Theorem (CRT) [26] and Visual Cryptography(VC) [20], etc.…”
Section: Introductionmentioning
confidence: 99%