2017 IEEE Trustcom/BigDataSE/Icess 2017
DOI: 10.1109/trustcom/bigdatase/icess.2017.259
|View full text |Cite
|
Sign up to set email alerts
|

A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…erefore, it is necessary to trace the user's identity in ABE. Zhang et al [17] proposed a scheme that can change user attributes and track the identity of traitors. e results show that the scheme provides feasibility and reliability for practical application.…”
Section: Related Workmentioning
confidence: 99%
“…erefore, it is necessary to trace the user's identity in ABE. Zhang et al [17] proposed a scheme that can change user attributes and track the identity of traitors. e results show that the scheme provides feasibility and reliability for practical application.…”
Section: Related Workmentioning
confidence: 99%
“…This is a fundamental problem with CP-ABE. To solve this, as shown in Table 1 , CP-ABE schemes that provide traceability to prevent key abuse have been proposed [ 5 , 6 , 7 , 8 , 9 , 10 ]. However, CP-ABE schemes that provide traceability can invade user privacy by exposing the users’ identifier values to the AA when the keys are issued, and thereby the anonymity of the users is reduced.…”
Section: Related Workmentioning
confidence: 99%
“…This is a situation that can occur due to the use of CP-ABE. To solve this problem, when the attribute authority, which verifies the attribute and issues the key, issues the key for each user, it records the user’s ID value or user signature value in the key parameter [ 6 , 7 , 8 , 9 , 10 , 11 ]. If the key is misused after the key is delegated or delivered to someone, research is being conducted to verify the identity by tracking the user who initially issued the key with the user ID value or user signature value included in the key parameter.…”
Section: Introductionmentioning
confidence: 99%
“…The traitor tracing mechanism refers to finding a malicious legal user/entity that intentionally distributes its key for monetary benefits. 73,74 The classification of access control schemes is presented in Figure 21.…”
Section: Access Control Schemesmentioning
confidence: 99%