2009
DOI: 10.1007/978-3-642-04474-8_28
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Aware Attribute-Based Encryption with User Accountability

Abstract: Abstract. As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern of user access privacy, privacy-aware ABE schemes are being developed to achieve hidden access policy recently. For the purpose of secure access control, there is, however, still one critical functionality missing in the existing ABE schemes, which is user accountability. Currently, no ABE scheme can completely prevent the pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
91
0
4

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
3
1

Relationship

3
6

Authors

Journals

citations
Cited by 142 publications
(95 citation statements)
references
References 17 publications
(30 reference statements)
0
91
0
4
Order By: Relevance
“…To address this problem, there are two main ideas: one is to prevent the key from being cloned and misused, just like [15][16][17][18][19], the other one is to provide traceability, proposed and improved in [20][21][22][23][24][25]. In [20], the scheme proposes methods to trace the source of leaks and traitors in broadcast encryption; an index identifying a user is the foundation of realizing traceability.…”
Section: Related Workmentioning
confidence: 99%
“…To address this problem, there are two main ideas: one is to prevent the key from being cloned and misused, just like [15][16][17][18][19], the other one is to provide traceability, proposed and improved in [20][21][22][23][24][25]. In [20], the scheme proposes methods to trace the source of leaks and traitors in broadcast encryption; an index identifying a user is the foundation of realizing traceability.…”
Section: Related Workmentioning
confidence: 99%
“…Later on, Waters [26] proposed the first deterministic finite automata-based functional encryption system in which access policy can be expressed by arbitrary-size regular language. Note that there are also some variants of traditional ABE in the literature, such as [21,20,13,27].…”
Section: Related Workmentioning
confidence: 99%
“…However, it is difficult to implement due to the complexity of the computational process required from the third party. Finally, Li et al [15] proposed encryption scheme crowded included in the ID of the user attribute, decrypts it when ID authentication is also carried out at the same time, although this scheme can improve the safety, but the public key distribution center will increase the workload. Hinek et al [16] proposed a tk-ABE(token-based attribute-based encryption) scheme that includes a token server to issue a token for a user to decrypt the cipher text, thus making the key cloning meaningless.…”
Section: Cp-abementioning
confidence: 99%