2021
DOI: 10.1007/978-3-030-88428-4_8
|View full text |Cite
|
Sign up to set email alerts
|

Attribute-Based Conditional Proxy Re-encryption in the Standard Model Under LWE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 31 publications
0
11
0
Order By: Relevance
“…• AB-CPRE with Re-encryption Simulatability. We apply the methods above to AB-CPRE scheme presented at ESORICS'21 [14]. We first formalize the HRA security model for AB-CPRE in this work and obtain a modified AB-CPRE scheme, scheme III.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…• AB-CPRE with Re-encryption Simulatability. We apply the methods above to AB-CPRE scheme presented at ESORICS'21 [14]. We first formalize the HRA security model for AB-CPRE in this work and obtain a modified AB-CPRE scheme, scheme III.…”
Section: Methodsmentioning
confidence: 99%
“…AB-CPRE was initially introduced by Liang et al in [14] at ESORICS'21. They provided a comprehensive definition of AB-CPRE, elaborated on its CPA model, meticulously constructed the corresponding scheme utilizing LWE, and presented rigorous proof of its selective CPA security.…”
Section: Construction Of Ab-cpre With Re-encryption Simulatabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…Their scheme only supported the access structure of the AND gate, and the access policy's expressiveness was relatively weak. To be able to control the proxy's ability to re-encrypt the original ciphertext, Liang et al [18] constructed the conditional ABPRE from lattice firstly, which met the requirements of more fine-grained data sharing. However, the schemes of [17] and [18] only satisfied the nature of single-use.…”
Section: Figure 1: Schematic Of Multi-use Prementioning
confidence: 99%
“…To be able to control the proxy's ability to re-encrypt the original ciphertext, Liang et al [18] constructed the conditional ABPRE from lattice firstly, which met the requirements of more fine-grained data sharing. However, the schemes of [17] and [18] only satisfied the nature of single-use. This limited the practicality of the scheme.…”
Section: Figure 1: Schematic Of Multi-use Prementioning
confidence: 99%