2019
DOI: 10.1016/j.future.2017.09.045
|View full text |Cite
|
Sign up to set email alerts
|

Traceable-then-revocable ciphertext-policy attribute-based encryption scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
76
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 64 publications
(77 citation statements)
references
References 11 publications
0
76
0
1
Order By: Relevance
“…In Table 1, the revocable ABE schemes [5,17,32] and our R-CP-ABOOE scheme support user revocation. However, the real (online) encryption algorithms in the schemes [5,17,32] must perform many exponentiation operations, which is unsuitable for mobile devices with limited-computation power. Fortunately, in our scheme, first the offline-encryption phase can be executed by high performance computer in a trusted environment.…”
Section: Performance Analysismentioning
confidence: 99%
See 4 more Smart Citations
“…In Table 1, the revocable ABE schemes [5,17,32] and our R-CP-ABOOE scheme support user revocation. However, the real (online) encryption algorithms in the schemes [5,17,32] must perform many exponentiation operations, which is unsuitable for mobile devices with limited-computation power. Fortunately, in our scheme, first the offline-encryption phase can be executed by high performance computer in a trusted environment.…”
Section: Performance Analysismentioning
confidence: 99%
“…Modular operation is much faster than the exponentiation operation. Thus, our real encryption algorithm is the fastest among these schemes [5,17,32].…”
Section: Performance Analysismentioning
confidence: 99%
See 3 more Smart Citations