2011 Seventh International Conference on Computational Intelligence and Security 2011
DOI: 10.1109/cis.2011.204
|View full text |Cite
|
Sign up to set email alerts
|

Attribute-based Signcryption with Ciphertext-policy and Claim-predicate Mechanism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
44
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 35 publications
(44 citation statements)
references
References 9 publications
0
44
0
Order By: Relevance
“…But, both of the key size are less than others if the number is small. On the other hand, it is obvious that the ciphertext size and signcryption cost of our scheme are less than those in [24,25,26].…”
Section: Performance Analysismentioning
confidence: 77%
See 4 more Smart Citations
“…But, both of the key size are less than others if the number is small. On the other hand, it is obvious that the ciphertext size and signcryption cost of our scheme are less than those in [24,25,26].…”
Section: Performance Analysismentioning
confidence: 77%
“…Most of the previous works [21,22,23,24] adopt the threshold policy as their access control structure which is only a coarse-grained level and supports only simple predicates. While the schemes in [25,26] support monotone tree policy which is similar with ours, the construction of this kind of policy is a little more complex. Since we consider the fact that some attributes may appear more than once in the access structure which is not taken into account by previous works [21,22,23,24,25,26], the size of signing secret key and decryption secret key grow linearly with the number of times of key attributes (must be used in signing or decryption).…”
Section: Performance Analysismentioning
confidence: 92%
See 3 more Smart Citations