2022 IEEE 10th International Conference on Computer Science and Network Technology (ICCSNT) 2022
DOI: 10.1109/iccsnt56096.2022.9972943
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Multi-Authority Attribute-Based Encryption with Policy Hiding and Updating

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(21 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…Compared to [36], our scheme has better storage cost for public parameters, ciphertext and user decryption key. Compared with [26,32,34,35], the storage cost of ciphertext and the user decryption key is approximately equal. It is worth noting that we implement the simulation of the algorithm by deploying the Charm-Crypto cryptographic library based on the Python language development framework in the Ubuntu system.…”
Section: Schemesmentioning
confidence: 99%
See 4 more Smart Citations
“…Compared to [36], our scheme has better storage cost for public parameters, ciphertext and user decryption key. Compared with [26,32,34,35], the storage cost of ciphertext and the user decryption key is approximately equal. It is worth noting that we implement the simulation of the algorithm by deploying the Charm-Crypto cryptographic library based on the Python language development framework in the Ubuntu system.…”
Section: Schemesmentioning
confidence: 99%
“…Finally, we present the results in Table 4. In order to show the computational time cost and the storage cost of our scheme and other schemes, we make a comparison with Zhang et al scheme [32] (ZZLL), Ma et al scheme [26] (MZYS), Xie et al scheme [34] (XRHS), Zhang et al scheme [35] (ZGWW) and Zhang et al scheme [36] (ZZWM). By analyzing the calculation overhead of the online user key generation phase, user decryption phase and the storage overhead of ciphertexts and keys in the system, there is a slight difference between the ZZWM scheme [36] and other schemes.…”
Section: Schemesmentioning
confidence: 99%
See 3 more Smart Citations