2016
DOI: 10.1002/sec.1659
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical attribute‐based encryption with continuous auxiliary inputs leakage

Abstract: The continuous auxiliary inputs leakage is more strong side-channel attacks. In this article, we first propose a continuous auxiliary inputs leakage model for the hierarchical attribute-based encryption scheme. Under the security model, an adversary has ability to gain partial updated master keys and updated secret keys continually by certain leakage attacks. Moreover, a resilient-leakage hierarchical attribute-based encryption scheme is constructed. The security proof for this scheme is provided under the sta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 34 publications
0
6
0
Order By: Relevance
“…In their work, they used the HABE approach to provide user anonymity and also traceability of dishonest users. Guo et al [41] proposed an HABE scheme with continuous auxiliary input leakage. Li et al [42] designed an HABE scheme with continuous leakage-resilience.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In their work, they used the HABE approach to provide user anonymity and also traceability of dishonest users. Guo et al [41] proposed an HABE scheme with continuous auxiliary input leakage. Li et al [42] designed an HABE scheme with continuous leakage-resilience.…”
Section: Related Workmentioning
confidence: 99%
“…In other words, Pr (B(g, g α , g β , g γ ,ê(g, g) αβγ ) = 1) = Pr(LW-RHABE A , (λ)). (41) Also, when z is a uniform element of Z q , h =ê(g, g) z is also a uniform element of G 2 . Therefore, assuming that H and S are secure, one can see that PCT T does not leak any partial information about M b and therefore, Pr(B(g, g α , g β , g γ ,ê(g, g) z )) = 1) = 1 2 .…”
Section: Security Analysismentioning
confidence: 99%
“…In order to improve efficiency, Emura et al [28] presented a CP-ABE scheme with constant ciphertext size. Many ABE schemes [29][30][31][32][33][34][35][36][37][38] were presented in various application domains, such as ABE with outsourced data decryption [29,30,37], ABE with efficient attribute revocation [31], ABE with full verifiability [30], ABE with keyword search function [29,31], traceable ABE [32,33], ABE with leakage resilience [34][35][36], auditable ABE [38], etc. In order to solve key escrow problem, Li et al [39,40] presented two certificate-based encryption schemes with leakage resilience.…”
Section: Related Workmentioning
confidence: 99%
“…The authorities collect the corresponding combinations of attributes and determine which data users decrypt such data. To achieve scalable, flexible, and fine-grained access control, some hierarchical attribute-based encryption schemes [23][24][25] were presented. In order to protect the privacy, Lai et al [27] and Li et al [28] provided ABE schemes with hidden access policy.…”
Section: Related Workmentioning
confidence: 99%