2015
DOI: 10.1109/tifs.2015.2449264
|View full text |Cite
|
Sign up to set email alerts
|

Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption

Abstract: Attribute-based encryption (ABE) is a promising technique for fine-grained access control of encrypted data in a cloud storage, however, decryption involved in the ABEs is usually too expensive for resource-constrained front-end users, which greatly hinders its practical popularity. In order to reduce the decryption overhead for a user to recover the plaintext, Green et al. suggested to outsource the majority of the decryption work without revealing actually data or private keys. To ensure the third-party serv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

2
71
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 132 publications
(76 citation statements)
references
References 25 publications
2
71
0
Order By: Relevance
“…Thus, scriptA has no advantage in real security game. The proof is similar to . In order to occupy less space, we omit the detailed proof here.…”
Section: Our Construction Of Cp‐abe Schemementioning
confidence: 99%
See 3 more Smart Citations
“…Thus, scriptA has no advantage in real security game. The proof is similar to . In order to occupy less space, we omit the detailed proof here.…”
Section: Our Construction Of Cp‐abe Schemementioning
confidence: 99%
“…Definition A KDF takes as input a secret key DK and a length l , then it outputs a string of l bits. KDF is secure if for any probabilistic polynomial‐time adversary scriptA, the following is negligible: |Pr[A(KDF(DK,l))=1]Pr[A(R)=1]|. Notice that DK denotes an initial secret key, l is the output length and R is chosen uniformly at random from {0,1} l .…”
Section: Preliminariesmentioning
confidence: 99%
See 2 more Smart Citations
“…In [14], Lai et al guaranteed that a user can efficiently check if the transformation is done correctly without relying on any random oracles. Compared with this scheme, Lin et al [15] proposed a more efficient construction ABE with verifiable outsourced decryption, which reduced the bandwidth and the computation costs almost by half. Some other similar works can be seen in [16][17][18].…”
Section: Related Workmentioning
confidence: 99%