2016
DOI: 10.1186/s40064-016-1765-9
|View full text |Cite
|
Sign up to set email alerts
|

High efficient key-insulated attribute based encryption scheme without bilinear pairing operations

Abstract: Attribute based encryption (ABE) has been widely applied for secure data protection in various data sharing systems. However, the efficiency of existing ABE schemes is not high enough since running encrypt and decrypt algorithms need frequent bilinear pairing operations, which may occupy too much computing resources on terminal devices. What’s more, since different users may share the same attributes in the system, a single user’s private key exposure will threaten the security and confidentiality of the whole… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 24 publications
(14 reference statements)
0
8
0
Order By: Relevance
“…While the elimination of pairing operations [10] hasn't been fully realized in ABS yet, however, in identity based cryptography and certificateless public cryptography, some researchers have successfully construct their schemes [13][14][15][16] without pairings. Ibrahim Elashry et al in [13] proposed an efficient identity based encryption scheme independent of pairings.…”
Section: Cryptology Without Pairingsmentioning
confidence: 99%
See 1 more Smart Citation
“…While the elimination of pairing operations [10] hasn't been fully realized in ABS yet, however, in identity based cryptography and certificateless public cryptography, some researchers have successfully construct their schemes [13][14][15][16] without pairings. Ibrahim Elashry et al in [13] proposed an efficient identity based encryption scheme independent of pairings.…”
Section: Cryptology Without Pairingsmentioning
confidence: 99%
“…But in attribute cryptosystem this seems impractical since the attribute a user possesses may be irrevocable (for instance "Nationality" "Gender", etc.). Consequently, how to carry out key exposure protection [10] in ABS is a significant and practical job.…”
Section: Introductionmentioning
confidence: 99%
“…Key-insulation mechanism can provide full security when user's private key exposure happens, which can also be introduced to provide key exposure protection in attribute based cryptosystem [25].…”
Section: Related Work and Preliminaries 21 Related Workmentioning
confidence: 99%
“…Afterwards, many studies [3][4][5] have been presented to provide better performances, higher security level, and more advanced functions. Aside from these properties, fine-grained access managements are also important because an uploader can take this advantage to make self-centric access policies on their private data [6][7][8][9]. To better satisfy this demand, Sahai et al presented attribute-based encryption (ABE) [10][11][12] which efficiently brings flexible access control.…”
Section: Introductionmentioning
confidence: 99%
“…Further, in most of the existing schemes, there exist additional transmission overheads of key updating. Consequently, an attribute-based keyword search with key exposure protection mechanism and efficient key refreshing [8] urgently needs to be proposed.…”
Section: Introductionmentioning
confidence: 99%