2015
DOI: 10.1007/978-3-319-28865-9_27
|View full text |Cite
|
Sign up to set email alerts
|

Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…The main difference between ours and the works of Rouselakis and Waters 8 and Zhang et al 24 is that we add 3q − 1 more terms, includ-…”
Section: Assumptionsmentioning
confidence: 81%
See 2 more Smart Citations
“…The main difference between ours and the works of Rouselakis and Waters 8 and Zhang et al 24 is that we add 3q − 1 more terms, includ-…”
Section: Assumptionsmentioning
confidence: 81%
“…We use a new q ‐type assumption that is similar to the q − 1 assumption in the works of Rouselakis and Waters and Zhang et al. The main difference between ours and the works of Rouselakis and Waters and Zhang et al is that we add 3 q − 1 more terms, including ()gaq+2,,ga3q+1 and ()g1false/a,,g1false/aq1, into our assumption. In Section 6.2, we will succinctly show our modified q ‐type assumption is generically secure.…”
Section: Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…In [15], abuse-free attribute enabled Access Control (AC) is developed for producing data security to the cloud users and authors present a very primitive idea for dealing with the AC system. In [20], the cipher-text policy system driven access control system was introduced, which enhanced the accountability of both the communicating parties. However, this scheme supported only a selective model for security.…”
Section: Introductionmentioning
confidence: 99%