2010
DOI: 10.3233/jcs-2009-0383
|View full text |Cite
|
Sign up to set email alerts
|

Secure attribute-based systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
130
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 185 publications
(131 citation statements)
references
References 29 publications
1
130
0
Order By: Relevance
“…Recently, several attribute revocable ABE schemes have been announced [2,3,4]. Undoubtedly, these approaches have two main problems, which consists of security degradation in terms of the backward and forward security [1,5].…”
Section: Related Workmentioning
confidence: 99%
“…Recently, several attribute revocable ABE schemes have been announced [2,3,4]. Undoubtedly, these approaches have two main problems, which consists of security degradation in terms of the backward and forward security [1,5].…”
Section: Related Workmentioning
confidence: 99%
“…Another approach to evaluate the CHECK function is attribute based encryption see Goyal et al [8], Pirretti et al [13], Sahai and Waters [15]. The idea is to associate each attribute a i in the system with some secret component of some private key sk.…”
Section: Related Workmentioning
confidence: 99%
“…It is used as a building-block in applications that demand complex access control to encrypted data [PTMW06], in designing protocols for verifiably outsourcing computations [PRV12], and for single-use functional encryption [GKP + 13b]. Here we focus on key-policy ABE where the access policy is embedded in the secret key.…”
Section: Introductionmentioning
confidence: 99%