2018
DOI: 10.1016/j.ins.2017.11.037
|View full text |Cite
|
Sign up to set email alerts
|

Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes

Abstract: Attribute-based encryption (ABE) is an augmentation of public key encryption that allows users to encrypt and decrypt messages based on users' attributes. In a ( t, s ) threshold ABE, users who can decrypt a ciphertext must hold at least t attributes among the s attributes specified by the encryptor. At PKC 2010, Herranz, Laguillaumie and Ràfols proposed the first threshold ABE with constant-size ciphertexts. In order to ensure the encryptor can flexibly select the attribute set and a threshold value, they use… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(11 citation statements)
references
References 27 publications
0
11
0
Order By: Relevance
“…In [8], a CP-ABE with constant size secret keys is proposed by using elliptic curve cryptography. Susilo et al [9] implemented an ABE scheme which has constant ciphertext length and has no extra dummy attributes. However, the references mentioned above only provide selective security.…”
Section: The Short Ciphertext and Efficient Abe Schemementioning
confidence: 99%
See 1 more Smart Citation
“…In [8], a CP-ABE with constant size secret keys is proposed by using elliptic curve cryptography. Susilo et al [9] implemented an ABE scheme which has constant ciphertext length and has no extra dummy attributes. However, the references mentioned above only provide selective security.…”
Section: The Short Ciphertext and Efficient Abe Schemementioning
confidence: 99%
“…Some researchers have proposed ABE schemes with short ciphertexts [7][8][9] and some of them can achieve a lower computational overhead for decryption. However, these schemes are proven secure under the selective security model, in which attackers are required to declare the access structure to be attacked before the setup phase.…”
Section: Introductionmentioning
confidence: 99%
“…Later, different types of access structures for CP-ABE [16][17][18] were introduced. Outsourced CP-ABE schemes [13][14][15] and short ciphertext and fast decryption [6][7][8][9][10][11][12] schemes were proposed to improve the efficiency. Furthermore, to improve the CP-ABE scheme security, policy privacy and revocation [19][20][21][22][23][24][25][26][27] schemes were presented.…”
Section: Related Workmentioning
confidence: 99%
“…Some schemes [11][12][13][14][15] have applied CP-ABE to realize file access control in the cloud. There are also some schemes to improve the algorithm itself, such as [16,17] fix the ciphertext size to improve performance, and [18,19] improve security through authority control or accountability, and [20][21][22] support attribute revocation to improve practicability. Scheme [23] supports proxy computing to private servers, and [24] supports hidden access policy, and [25] proposes a lightweight and efficient CP-ABE.…”
Section: Related Workmentioning
confidence: 99%