2016
DOI: 10.1007/978-3-319-47422-9_1
|View full text |Cite
|
Sign up to set email alerts
|

Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(14 citation statements)
references
References 24 publications
0
14
0
Order By: Relevance
“…This is a fundamental problem with CP-ABE. To solve this, as shown in Table 1 , CP-ABE schemes that provide traceability to prevent key abuse have been proposed [ 5 , 6 , 7 , 8 , 9 , 10 ]. However, CP-ABE schemes that provide traceability can invade user privacy by exposing the users’ identifier values to the AA when the keys are issued, and thereby the anonymity of the users is reduced.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…This is a fundamental problem with CP-ABE. To solve this, as shown in Table 1 , CP-ABE schemes that provide traceability to prevent key abuse have been proposed [ 5 , 6 , 7 , 8 , 9 , 10 ]. However, CP-ABE schemes that provide traceability can invade user privacy by exposing the users’ identifier values to the AA when the keys are issued, and thereby the anonymity of the users is reduced.…”
Section: Related Workmentioning
confidence: 99%
“…Table shows CP-ABE methods that deal with key security as well as other security requirements for CP-ABE methods, such as traceability for tracking key abuse, constant size output of ciphertext, and the application of outsourcing techniques for efficiency of operation. Among the methods to provide traceability, the Liu scheme [ 6 ], Yu scheme [ 8 ], and Li scheme [ 5 ] are contain the user value (signature, ID) value. AA is the identity table that manages the user’s information, and the issued key suggests a scheme.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on the scheme [31], Ning et al [17] exploited the whitebox traceability for CP-ABE in large universe settings. From then on, many traceable ABE constructions are proposed in [6,32,33]. However, in these traceable schemes [6,16,17,30,32,33], the decryption overhead grows with the scale of attribute set adopted in decryption.…”
Section: Related Work Abe Was First Introduced Inmentioning
confidence: 99%
“…From then on, many traceable ABE constructions are proposed in [6,32,33]. However, in these traceable schemes [6,16,17,30,32,33], the decryption overhead grows with the scale of attribute set adopted in decryption. Table 1 compares the characteristics between some related works and our VTCP-ABE.…”
Section: Related Work Abe Was First Introduced Inmentioning
confidence: 99%