2017
DOI: 10.1155/2017/7323158
|View full text |Cite
|
Sign up to set email alerts
|

Shorter Decentralized Attribute-Based Encryption via Extended Dual System Groups

Abstract: Decentralized attribute-based encryption (ABE) is a special form of multiauthority ABE systems, in which no central authority and global coordination are required other than creating the common reference parameters. In this paper, we propose a new decentralized ABE in prime-order groups by using extended dual system groups. We formulate some assumptions used to prove the security of our scheme. Our proposed scheme is fully secure under the standard -Lin assumption in random oracle model and can support any mon… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(9 citation statements)
references
References 34 publications
0
9
0
Order By: Relevance
“…Inspired by [18,20], we adopt a hash function H to map user identities to the elements in group G 2 . Unlike with [18,20], we use a CA to personalize the identity key for each user and the AAs to generate the corresponding attribute keys, so our construction can achieve multiple authorities and the AAs cannot get the user decryption key. Furthermore, we employ a full signature scheme [32] to realize traceability.…”
Section: Constructionmentioning
confidence: 99%
See 3 more Smart Citations
“…Inspired by [18,20], we adopt a hash function H to map user identities to the elements in group G 2 . Unlike with [18,20], we use a CA to personalize the identity key for each user and the AAs to generate the corresponding attribute keys, so our construction can achieve multiple authorities and the AAs cannot get the user decryption key. Furthermore, we employ a full signature scheme [32] to realize traceability.…”
Section: Constructionmentioning
confidence: 99%
“…More specifically, the CA injects the signature of the user identity into the user identity key and traces the user by his decryption key. We now present our T-MA-CP-ABE construction based on [18,20], in which each attribute authority AA j manages an attributes set S j .…”
Section: Constructionmentioning
confidence: 99%
See 2 more Smart Citations
“…Encryption. Brent Waters firstly introduced a methodology to build adaptively secure IBE and HIBE which is dual system encryption [35], and a lot of work relied on this powerful proof tool [33,[36][37][38]. In dual system encryption schemes, there are two forms of ciphertext and key: normal and semifunctional.…”
Section: Dual Systemmentioning
confidence: 99%