2011
DOI: 10.1007/978-3-642-19379-8_5
|View full text |Cite
|
Sign up to set email alerts
|

Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption

Abstract: Abstract. In this paper we propose generic conversions for transforming a chosen-plaintext (CPA) secure attribute-based encryption (ABE) to a chosen-ciphertext (CCA) secure ABE. The only known generic conversion, to the best of our knowledge, was presented by Goyal et al. in ACM-CCS 2006, which itself subsumes the well-known IBE-to-PKE conversion by Canetti, Halevi, and Katz proposed in Eurocrypt 2004. The method by Goyal et al. has some restrictions that it assumes the delegatability of the original ABE and c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
54
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 63 publications
(59 citation statements)
references
References 31 publications
0
54
0
Order By: Relevance
“…Interestingly, our IND-CCA secure CP-ABE component is more efficient than the previous ABE schemes achieving IND-CCA security [27] because ours replies only one dummy attribute in the ciphertext.…”
Section: Introductionmentioning
confidence: 93%
“…Interestingly, our IND-CCA secure CP-ABE component is more efficient than the previous ABE schemes achieving IND-CCA security [27] because ours replies only one dummy attribute in the ciphertext.…”
Section: Introductionmentioning
confidence: 93%
“…The security in [16] is provable secure against chosen plaintext attacks (CPA) in the generic group model. Later, Yamada et al [28] showed a generic construction for achieving chosenciphertext security (CCA) under the condition that the ABE scheme is of either delegatability or verifiability. Aiming to achieve CCA security in the standard model, Ge et al [13] presented another threshold CP-ABE scheme with constant size ciphertexts by using the technique of [6].…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, the size of the public parameters is linear to the upper bound of attribute number in the selected attribute set in the encryption phase. For further details about the differences between small universe and large universe, we refer the readers to [19,28]. The notion of ABE was originally proposed for flexible access control.…”
Section: Related Workmentioning
confidence: 99%
“…4 Informally, it states that a decryption oracle cannot help the adversary break the semantic security of the scheme, and it has been studied for years in the setting of PKE [30,12]. It has also been examined in the context of identity-based encryption [9,23] and attribute-based encryption [34], which are particular cases of functional encryption. It is thus natural to analyze it for inner-product functional encryption.…”
Section: Inner-product Functional Encryptionmentioning
confidence: 99%