2015
DOI: 10.1002/cpe.3623
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of a privacy‐preserving decentralized ciphertext‐policy attribute‐based encryption scheme

Abstract: As it does not require a central authority or the cooperation among multiple authorities, decentralized attribute-based encryption is an efficient and flexible multi-authority attribute-based encryption system. In most existing multi-authority attribute-based encryption schemes, a global identifier (GID) is introduced to act as the linchpin to resist collusion attacks. Because GID as well as some sensitive attributes used to apply for secret keys will lead to the compromise of user's privacy, some schemes towa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…It becomes a laborious task to reverse engineer the constructions and assert their security. Unfortunately, some are later shown to be insecure [10,14,27,22] …”
Section: Our Contributionsmentioning
confidence: 99%
“…It becomes a laborious task to reverse engineer the constructions and assert their security. Unfortunately, some are later shown to be insecure [10,14,27,22] …”
Section: Our Contributionsmentioning
confidence: 99%
“…Commitment schemes and zero-knowledge proof technology are introduced to protect the user's GID and attributes. However, note that it has been proved not to protect the user's attributes effectively in scheme [12]. Qian et al [13] proposed a privacypreserving personal health record scheme using multi-authority attribute-based encryption with revocation.…”
Section: Related Workmentioning
confidence: 99%
“…The schemes in [8,10,11] have privacy protection but they can't support policy updating. In the schemes in [8,12,17], only the privacy of the GID has been considered. Obviously, they can't protect the privacy of attributes.…”
Section: Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Han et al [15] first proposed a scheme to address the privacy of attributes via anonymous protocol. Nevertheless, Wang et al [16] pointed out such solution was vulnerable to collusion attack and showed that the privacy-preserving key extract protocol from [15] didn't provide the privacy protection of attributes. Wang et al [16] didn't propose an improved scheme.…”
Section: Introductionmentioning
confidence: 99%