2014
DOI: 10.1109/tpds.2013.253
|View full text |Cite
|
Sign up to set email alerts
|

Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
135
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 220 publications
(136 citation statements)
references
References 9 publications
1
135
0
Order By: Relevance
“…Among them, Muller proposed another MA-ABE scheme which is realized on any access structure with an authentication center. Yang and Jia [18] proposed a variant CP-ABE scheme to support multiauthority, but it still requires an additional authentication center to generate user secret key and authority secret key. Moreover, it is weak in revocation security.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Among them, Muller proposed another MA-ABE scheme which is realized on any access structure with an authentication center. Yang and Jia [18] proposed a variant CP-ABE scheme to support multiauthority, but it still requires an additional authentication center to generate user secret key and authority secret key. Moreover, it is weak in revocation security.…”
Section: Related Workmentioning
confidence: 99%
“…There exist several MA-CP-ABE schemes [11,13,[15][16][17][18]], but they are not designed for PUD's scenario. Commented by paper [14], CC MA-ABE [13,17] is limited by the strict "AND" policy.…”
Section: Introductionmentioning
confidence: 99%
“…Multiauthority ciphertext policy ABE (MACP-ABE) scheme is constructed on the basis of standard model by Lin et al [5] [6]. Further, to reduce the trust on central authority Chase [8] proposed a new scheme Multiple Authority Based Encryption (MABE).…”
Section: Multi-authority Attribute Based Encryptionmentioning
confidence: 99%
“…The immediate revocable schemes have proposed. The immediate system-level user revocation method [16], [21], [34], [35] and the immediate attributelevel key revocation method [12], [15], [30], [36], [37] have proposed. The concept of negative attribute enable to revoke the user at the system level.…”
Section: Introductionmentioning
confidence: 99%
“…The dynamic attribute does not mean that attribute fields are newly added or deleted but mean that some specific attribute field value can be changed. CP-ABE schemes which have capability of revoking some current attributes have been proposed [12], [15], [29]- [32], [37]. In these schemes, the secret keys are needed to update when an attribute revocation happens.…”
Section: Introductionmentioning
confidence: 99%