2020
DOI: 10.1007/978-3-030-45374-9_1
|View full text |Cite
|
Sign up to set email alerts
|

Fast, Compact, and Expressive Attribute-Based Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(17 citation statements)
references
References 31 publications
0
14
0
Order By: Relevance
“…As can be deduced from Tables 2-4, GSW is the most efficient scheme. However, it does not support the multiuse [26] 15n t + 18n f 12n′ 3 d -GSW [31] n 1 --- and adaptive security properties. Although JL supports multiuse of attributes in the access policy, the computation cost of key generation increases with multiuse of attribute by the factor of d. However, since our scheme and Lw use the selective technique in generation of either the ciphertext or the key, the scheme performance is not affected by the multiuse of attribute.…”
Section: Eoretical Comparisonmentioning
confidence: 95%
See 4 more Smart Citations
“…As can be deduced from Tables 2-4, GSW is the most efficient scheme. However, it does not support the multiuse [26] 15n t + 18n f 12n′ 3 d -GSW [31] n 1 --- and adaptive security properties. Although JL supports multiuse of attributes in the access policy, the computation cost of key generation increases with multiuse of attribute by the factor of d. However, since our scheme and Lw use the selective technique in generation of either the ciphertext or the key, the scheme performance is not affected by the multiuse of attribute.…”
Section: Eoretical Comparisonmentioning
confidence: 95%
“…From the studies in [12], it can be inferred that as "q" grows larger, the "q-type" assumption becomes stronger and the scheme which requires it becomes vulnerable, particularly if "q" scales in a predictable way. Recently, Tomida et al [26] and Kowalczyk et al [27] proposed ABE schemes that address the problem of one-use restriction of attributes in access policy. e schemes were built on a piecewise guessing framework developed in [28], and they proved adaptive security of the ABE constructions with some polynomial security losses.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations