2013
DOI: 10.1007/978-3-642-40203-6_33
|View full text |Cite
|
Sign up to set email alerts
|

Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
58
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
7
2

Relationship

5
4

Authors

Journals

citations
Cited by 115 publications
(64 citation statements)
references
References 19 publications
0
58
0
Order By: Relevance
“…Recently, much research effort has been devoted largely to ensure the security of cloud computing [15]- [18] and remotely stored data [1]- [3], [9], [11], [19]- [21]. Ateniese et al [1] defined the "provable data possession" (PDP) model for ensuring possession of files on untrusted storages.…”
Section: A Related Workmentioning
confidence: 99%
“…Recently, much research effort has been devoted largely to ensure the security of cloud computing [15]- [18] and remotely stored data [1]- [3], [9], [11], [19]- [21]. Ateniese et al [1] defined the "provable data possession" (PDP) model for ensuring possession of files on untrusted storages.…”
Section: A Related Workmentioning
confidence: 99%
“…Specifically, it has to re-issue private keys to all the other "affected" physicians, which introduces an overhead computation at authority. This issue can be fixed by using outsourced key-issuing protocol and delegating the attribute-related computation to other cloud service provider [21]. With this technique [21], during a single re-issuing of private key, the authority just needs to nearly three single-based modular exponentiations at local, and its complexity is minimized.…”
Section: Physician Revocationmentioning
confidence: 99%
“…Generally, there are two alternatives for secure delegating decryption: one is based on blinding private keys [12] and the other is to introduce a trivial attribute and use it to control local decryption [21]. In this paper, we just focus the former technique and attempt to extend it to our setting for facilitate physicians' decryption.…”
Section: Fig 3 Algorithms For Physician Revocationmentioning
confidence: 99%
“…Zhou et al [28] presented a CP-ABE scheme with constant-size ciphertexts and AND * +,− policy while the decryption cost linearly grows with the number of attributes in universe. Although outsourced ABE [11,15,17] can reduce the computation cost of users, the systems have to introduce additional servers. Currently, the CP-ABE construction proposed by Chen et al [6] is most efficient.…”
Section: Introductionmentioning
confidence: 99%