2016
DOI: 10.1007/s11432-015-5428-1
|View full text |Cite
|
Sign up to set email alerts
|

Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating

Abstract: Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack SCIENCE CHINA Information Sciences 60, 052105 (2017); Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs SCIENCE CHINA Information Sciences 64, 169301 (2021); Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability SCIENCE CHINA Information Sciences 61, 032102 (2018); Accountable authority key policy attribute-based encr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 30 publications
(44 citation statements)
references
References 12 publications
(45 reference statements)
0
44
0
Order By: Relevance
“…To update linear secret sharing scheme (LSSS) based access policy, the scheme in [31] designs a policy compare algorithm to divide the update policy into three types and disparate methods to update the old policy according the different types. The policy updating method in [31] is utilized to construct other ABE schemes in [32,33]. The searchable encryption and ABE are integrated in [34,35] such that the authorized data user (with attributes satisfy the access policy) can utilize a keyword based trapdoor to retrieve on data owner's encrypted files.…”
Section: Attribute Based Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…To update linear secret sharing scheme (LSSS) based access policy, the scheme in [31] designs a policy compare algorithm to divide the update policy into three types and disparate methods to update the old policy according the different types. The policy updating method in [31] is utilized to construct other ABE schemes in [32,33]. The searchable encryption and ABE are integrated in [34,35] such that the authorized data user (with attributes satisfy the access policy) can utilize a keyword based trapdoor to retrieve on data owner's encrypted files.…”
Section: Attribute Based Encryptionmentioning
confidence: 99%
“…In this section, we firstly compare the proposed fusion of IoT and big data system with the state-of-the art schemes [31,32,33,34,35,36] that support fine-grained access control mechanism. Then, they are evaluated using the simulation in terms of communication and computation costs.…”
Section: Performance Analysis and Comparisonmentioning
confidence: 99%
“…The particular properties of chaos [16], such as sensitivity to initial conditions and system parameters, pseudo-randomness, ergodicity and so on, have granted chaotic dynamics as a promising alternative for the conventional cryptographic algorithms [19,21,2,1,20]. The inherent properties connect it directly with cryptographic characteristics of confusion and diffusion, which is presented in Shannon's works [15].…”
Section: Previous Workmentioning
confidence: 99%
“…Consequently, ABE is a more effective tool for data protection in large data outsource platforms. Existing literatures related to ABE have achieved many results in terms of fine-grained access control [7,13], revocation [6], key abuse protection [9], etc. Researchers have also implemented ABE in several practical scenarios such as wireless communications, cloud computing [14], etc.…”
Section: Attribute-based Cryptosystemmentioning
confidence: 99%
“…Afterwards, many studies [3][4][5] have been presented to provide better performances, higher security level, and more advanced functions. Aside from these properties, fine-grained access managements are also important because an uploader can take this advantage to make self-centric access policies on their private data [6][7][8][9]. To better satisfy this demand, Sahai et al presented attribute-based encryption (ABE) [10][11][12] which efficiently brings flexible access control.…”
Section: Introductionmentioning
confidence: 99%