2015
DOI: 10.1002/sec.1326
|View full text |Cite
|
Sign up to set email alerts
|

Provably secure unbounded multi‐authority ciphertext‐policy attribute‐based encryption

Abstract: Multi-authority attribute-based encryption (ABE) is a generation of ABE where the descriptive attributes are managed by different authorities. In current multi-authority ABE schemes, the scale of attribute universe employed in encryption is restricted by various predefined thresholds. In this paper, we propose an unbounded multi-authority ciphertext-policy ABE system without such restriction. Our scheme consists of multiple attribute authorities (AAs), one central authority (CA), and users labeled by the set o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
19
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 27 publications
(19 citation statements)
references
References 34 publications
0
19
0
Order By: Relevance
“…In this section, the proposed scheme is compared with existing typical schemes from both the security and the efficiency aspects. We summarize the comparison results in Tables and .…”
Section: Performance Comparisonsmentioning
confidence: 99%
See 3 more Smart Citations
“…In this section, the proposed scheme is compared with existing typical schemes from both the security and the efficiency aspects. We summarize the comparison results in Tables and .…”
Section: Performance Comparisonsmentioning
confidence: 99%
“…As shown in Table , all these schemes are expressive and allow LSSS ciphertext policies except the tree key policies in . As for the security level, the schemes and ours are proven secure in the standard model, and the scheme uses the random oracle model. Note that only the schemes are fully secure and the others achieve selective security.…”
Section: Performance Comparisonsmentioning
confidence: 99%
See 2 more Smart Citations
“…The data owner generates the index for ciphertext using a self-centric access policy, indicating what kinds of receivers are given the privileges to gain access to these encrypted data. The receiver generates the trapdoor for the desired keyword using the private key she owns [19,20]. The cloud server checks if the trapdoor generated by receiver corresponds with the search index.…”
Section: Introductionmentioning
confidence: 99%