2012
DOI: 10.1109/tpds.2012.50
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
96
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 149 publications
(96 citation statements)
references
References 19 publications
0
96
0
Order By: Relevance
“…In subsequent works [8], [12], they focused on policies across multi-ple authorities and the issue of whatexpressions they couldachieve. Up until recently, Sahai and Waters [9] raised aconstruction for realizing KP-ABE for general circuits.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…In subsequent works [8], [12], they focused on policies across multi-ple authorities and the issue of whatexpressions they couldachieve. Up until recently, Sahai and Waters [9] raised aconstruction for realizing KP-ABE for general circuits.…”
Section: Literature Surveymentioning
confidence: 99%
“…There are two complementary forms of attribute-based encryption. One is key-policy attribute-based encryption (KP-ABE) [8], [9], [10], and the other is cipher text-policy attribute-based encryption. In a KP-ABE system, the decision of access policy is made by the key distributor instead of the enciphered, which limits the practicability and usability for the system in practical applicationsthe access policy for general circuits could be regarded as the strongest form of the policy expression that circuits can express any program of fixed running time.…”
Section: Introductionmentioning
confidence: 99%
“…During decryption while reducing computation cost the decryption cost is also reduces and by using KP-ABE scheme overcome the restriction of circuits [3] and by using securely outsourcing [4] we introduce key generation service provider(KGSP) and Decryption service provider(DSP) and by using this verifiable delegation model removes multi authority ABE scheme [7] it maintains single authority. i.e., in this data owner obtain privately verified key to verify correctness of data and the VD-CPABE [1] System does not allow to cheat authorised user.…”
Section: IImentioning
confidence: 99%
“…In these schemes, an access structure is embedded in the secret keys, while the ciphertext is associated with a set of attributes [30,9,10,14,26,16]. CP-ABE.…”
Section: Attribute-based Encryptionmentioning
confidence: 99%
“…Recently, Han et al [16] proposed a privacy-preserving decentralized KP-ABE (PPDKP-ABE) scheme. In this scheme, multiple authorities can work independently without any cooperation.…”
Section: Multi-authority Attribute-based Encryptionmentioning
confidence: 99%