2016
DOI: 10.1109/tpds.2015.2448095
|View full text |Cite
|
Sign up to set email alerts
|

TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage

Abstract: Attribute-based Encryption (ABE) is regarded as a promising cryptographic conducting tool to guarantee data owners' direct control over their data in public cloud storage. The earlier ABE schemes involve only one authority to maintain the whole attribute set, which can bring a single-point bottleneck on both security and performance. Subsequently, some multi-authority schemes are proposed, in which multiple authorities separately maintain disjoint attribute subsets. However, the single-point bottleneck problem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
102
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 127 publications
(102 citation statements)
references
References 35 publications
(57 reference statements)
0
102
0
Order By: Relevance
“…If the AA is compromised, the attacker gains access to the master key and generates a secret key to the unauthorized user that is used to decrypt the ciphertext. Recently, Li et al 25 proposed a threshold multiauthority CP-ABE scheme (TMACS) for secure sharing of data in cloud computing. To overcome these problems, various multiauthority dynamic key management CP-ABE schemes [22][23][24] have been proposed.…”
Section: Sahai and Watermentioning
confidence: 99%
See 2 more Smart Citations
“…If the AA is compromised, the attacker gains access to the master key and generates a secret key to the unauthorized user that is used to decrypt the ciphertext. Recently, Li et al 25 proposed a threshold multiauthority CP-ABE scheme (TMACS) for secure sharing of data in cloud computing. To overcome these problems, various multiauthority dynamic key management CP-ABE schemes [22][23][24] have been proposed.…”
Section: Sahai and Watermentioning
confidence: 99%
“…Moreover, the scheme 37 does not provide forward secrecy. Most of the existing schemes 25,37,38,40,43,44 configure multiple AA centers, where each AA possesses its own disjointed attribute set and issues the attribute secret key to a user independently. In Yang et al, 38 the key authority center is divided into multiauthority key generation centers to facilitate escrow-free dynamic key management configuration.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Later, Li et al [11] proposed an ABE scheme with attribute revocation mechanism based on CC MA-ABE, which is limited on a rule of CNF in the access policy. A threshold multiauthority CP-ABE access control scheme was proposed for public cloud storage with which both security and performance are improved [22].…”
Section: Related Workmentioning
confidence: 99%
“…The solution to problems created due to single authority schemes is using multi-authority schemes which jointly manage universal authority sets such that each attribute is able to share secret keys to users independently [9]. By using multiple authorities, a load of user legitimacy verification on single authority is reduced [11]. In this paper, we use the system containing AA (Attribute Authority), which is responsible for performing user legitimacy verification and send an intermediate request to CA for obtaining secret key.…”
Section: Introductionmentioning
confidence: 99%