2020
DOI: 10.1016/j.jisa.2019.102435
|View full text |Cite
|
Sign up to set email alerts
|

Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
74
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(74 citation statements)
references
References 24 publications
0
74
0
Order By: Relevance
“…On the one hand, for the communication cost, we can draw the following conclusions: Firstly, our scheme has the advantages in the length of the private key that our scheme supports big attribute universe. More precisely, the public key of our scheme does not increase linearly with the size of the attribute domain in an attribute authority, while that of the YLMH scheme will, and the storage occupied by our public key is smaller than that of the SPB scheme [32] and the ZLML scheme. Secondly, although the user's private keys in the YB scheme and the YLMH scheme are relatively small, none of these schemes support traceability.…”
Section: 1mentioning
confidence: 96%
See 1 more Smart Citation
“…On the one hand, for the communication cost, we can draw the following conclusions: Firstly, our scheme has the advantages in the length of the private key that our scheme supports big attribute universe. More precisely, the public key of our scheme does not increase linearly with the size of the attribute domain in an attribute authority, while that of the YLMH scheme will, and the storage occupied by our public key is smaller than that of the SPB scheme [32] and the ZLML scheme. Secondly, although the user's private keys in the YB scheme and the YLMH scheme are relatively small, none of these schemes support traceability.…”
Section: 1mentioning
confidence: 96%
“…YB [11] SPB [32] YLMH [30] ZLML [31] Ours AA's public key attributes. is is because each attribute in the user's private key must be calculated accordingly.…”
Section: Experimental Analysismentioning
confidence: 99%
“…Recently, the proposal in [20] has realized multiauthority CP-ABE with large attribute universe and white-box traceability, while the ability of user tracing is limited and just suitable for certain scenarios. e multiauthority CP-ABE scheme [21] highlights the efficiency in traceable decentralized CP-ABE scheme, while it also suffers from the same drawback with [20].…”
Section: Attribute-based Encryptionmentioning
confidence: 99%
“…For example, when a data owner intends to share the data with a targeted data consumer holding the attribute "Professor" from a university and the attribute "Engineer" from a research institution, obviously SA-ABE scheme can not be applied to this scenario. To deal with this problem, many researchers [10][11][12][13][14][15][16][17][18][19][20][21][22][23][24] turn to multi-authority attribute-based encryption (MA-ABE), so that secret keys of attributes are issued to data consumers with the corresponding privileges for different attribute authorities respectively. There exists two kinds of multi-authority ABE schemes, namely centralized multi-authority ABE and decentralized multi-authority ABE, the difference between them is whether the key is distributed by center authority.…”
Section: Introductionmentioning
confidence: 99%
“…When the key is distributed by central authority, we can consider it as centralized multi-authority ABE scheme [10]. When the key is distributed by attribute authority, we can consider it as decentralized multi-authority ABE scheme [2][3][4][5][6][7][8][9][11][12][13][14][15][16][17][18][19][20][21][22][23][25][26].…”
Section: Introductionmentioning
confidence: 99%