2019
DOI: 10.1002/ett.3785
|View full text |Cite
|
Sign up to set email alerts
|

A verifiable hidden policy CP‐ABE with decryption testing scheme and its application in VANET

Abstract: As a new kind of cryptographic primitive, attribute‐based encryption (ABE) is widely used in various complex scenarios because it has the characteristic of access control while encrypting messages. However, the existing ciphertext policy ABE (CP‐ABE) encryption schemes have some inherent defects, such as the lack of privacy‐preserving and inefficient decryption. These weak points make them difficult to play a role in scenarios with high real‐time and high data confidentiality requirements, for example, vehicle… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
24
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(24 citation statements)
references
References 26 publications
0
24
0
Order By: Relevance
“…Moreover, attacks like Impersonation, Modification, ID Disclosure, Location Tracking, Repudiation, and denial of service (DoS) are removed. Similar work with improved cryptographic primitive attribute-based encryption (CP-ABE) is defined in [4]. In this work, due to attribute-based encryption, the overall network speed is improved along with a reduction of the attack probability in the network.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, attacks like Impersonation, Modification, ID Disclosure, Location Tracking, Repudiation, and denial of service (DoS) are removed. Similar work with improved cryptographic primitive attribute-based encryption (CP-ABE) is defined in [4]. In this work, due to attribute-based encryption, the overall network speed is improved along with a reduction of the attack probability in the network.…”
Section: Related Workmentioning
confidence: 99%
“…In this work, due to attribute-based encryption, the overall network speed is improved along with a reduction of the attack probability in the network. A verifiable hidden policy CP-ABE with a decryption testing scheme is also proposed in [4], it allows nodes to be tested and authenticated before performing network communication. This work is improved by adding true blockchain solutions, which is described in [5], wherein blockchain is used for privacy preservation along with reduction of the computational complexity of the system.…”
Section: Related Workmentioning
confidence: 99%
“…However, all of the abovementioned verifiable outsourcing schemes meet the CPA security requirements. A verifiable hidden policy CP-ABE with a decryption testing scheme (VHPDT) was proposed by Zhao et al [30], which is CCA-secure. Meanwhile, the VHPDT scheme introduces a predetection algorithm to increase the efficiency of the decryption.…”
Section: Related Workmentioning
confidence: 99%
“…CP‐ABE schemes 7,35 were proposed to provide fine‐grained access control over encrypted data, and CP‐ABSE schemes were proposed to provide both fine‐grained access control and keyword search, simultaneously. Zheng et al 18 designed a CP‐ABSE scheme enabling data owners to give fine‐grained search permissions.…”
Section: Related Workmentioning
confidence: 99%
“…As shown in Figure 1, in a cloud‐based IoT environment, data files are gathered by several smart devices and outsourced to a cloud service provider, and data users can obtain data of interest from the cloud. However, as the cloud service provider is not assumed to be trustworthy, 5–7 to provide the data confidentiality, encrypting the data before outsourcing is necessary. But unfortunately, searching over the encrypted data is a challenging task considering the current technologies.…”
Section: Introductionmentioning
confidence: 99%