메뉴 건너뛰기




Volumn 6980 LNCS, Issue , 2011, Pages 84-101

Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost

Author keywords

Attribute based encryption; chosen ciphertext security; efficiency

Indexed keywords

ACCESS POLICIES; ACCESS STRUCTURE; CHOSEN CIPHERTEXT ATTACK; CHOSEN CIPHERTEXT SECURITY; CIPHERTEXTS; COLLISION-RESISTANT HASH FUNCTIONS; COMPUTATION COSTS; DATA ACCESS; ENCRYPTED DATA; ENCRYPTION AND DECRYPTION; PLAINTEXT; PRIVATE KEY; STANDARD MODEL;

EID: 80053159200     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-24316-5_8     Document Type: Conference Paper
Times cited : (122)

References (29)
  • 2
    • 79952510987 scopus 로고    scopus 로고
    • Expressive Key-Policy Attribute- Based Encryption with Constant-Size Ciphertexts
    • Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
    • Attrapadung, N., Libert, B., De Panafieu, E.: Expressive Key-Policy Attribute- Based Encryption with Constant-Size Ciphertexts. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 90-108. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6571 , pp. 90-108
    • Attrapadung, N.1    Libert, B.2    De Panafieu, E.3
  • 3
    • 79952511284 scopus 로고    scopus 로고
    • Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation
    • Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
    • Attrapadung, N., Libert, B.: Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 384-402. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6056 , pp. 384-402
    • Attrapadung, N.1    Libert, B.2
  • 5
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440-456. Springer, Heidelberg (2005) (Pubitemid 41313968)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 7
    • 74049163235 scopus 로고    scopus 로고
    • Improving Privacy and Security in Multi-Authority Attribute-Based Encryption
    • ACM, New York
    • Chase, M., Chow, S.S.M.: Improving Privacy and Security in Multi-Authority Attribute-Based Encryption. In: ACM Conference on Computer and Communication Security 2009, pp. 195-203. ACM, New York (2009)
    • (2009) ACM Conference on Computer and Communication Security 2009 , pp. 195-203
    • Chase, M.1    Chow, S.S.M.2
  • 8
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority Attribute Based Encryption
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Chase, M.: Multi-authority Attribute Based Encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 515-534. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 515-534
    • Chase, M.1
  • 9
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-Ciphertext Security from Identity-Based Encryption
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Canetti, R., Halevi, S., Katz, J.: Chosen-Ciphertext Security from Identity-Based Encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 11
    • 70350635850 scopus 로고    scopus 로고
    • A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
    • Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. Springer, Heidelberg
    • Emura, K., Miyaji, A., Nomura, A., Omote, K., Soshi, M.: A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 13-23. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5451 , pp. 13-23
    • Emura, K.1    Miyaji, A.2    Nomura, A.3    Omote, K.4    Soshi, M.5
  • 12
    • 84956859011 scopus 로고    scopus 로고
    • How to Enhance the Security of Public-Key Encryption at Minimum Cost
    • Imai, H., Zheng, Y. (eds.) PKC 1999. Springer, Heidelberg
    • Fujisaki, E., Okamoto, T.: How to Enhance the Security of Public-Key Encryption at Minimum Cost. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 53-68. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1560 , pp. 53-68
    • Fujisaki, E.1    Okamoto, T.2
  • 13
    • 49049111604 scopus 로고    scopus 로고
    • Bounded Ciphertext Policy Attribute Based Encryption
    • Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
    • Goyal, V., Jain, A., Pandey, O., Sahai, A.: Bounded Ciphertext Policy Attribute Based Encryption. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 579-591. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5126 , pp. 579-591
    • Goyal, V.1    Jain, A.2    Pandey, O.3    Sahai, A.4
  • 15
    • 79952523217 scopus 로고    scopus 로고
    • Constant Size Ciphertexts in Threshold Attribute-Based Encryption
    • Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
    • Herranz, J., Laguillaumie, F., Ràfols, C.: Constant Size Ciphertexts in Threshold Attribute-Based Encryption. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 19-34. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6056 , pp. 19-34
    • Herranz, J.1    Laguillaumie, F.2    Ràfols, C.3
  • 17
    • 77952021770 scopus 로고    scopus 로고
    • Efficient CCA-Secure PKE from Identity- Based Techniques
    • Pieprzyk, J. (ed.) CT-RSA 2010. Springer, Heidelberg
    • Lai, J., Deng, R.H., Liu, S., Kou, W.: Efficient CCA-Secure PKE from Identity- Based Techniques. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol. 5985, pp. 132-147. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5985 , pp. 132-147
    • Lai, J.1    Deng, R.H.2    Liu, S.3    Kou, W.4
  • 18
    • 77954635558 scopus 로고    scopus 로고
    • Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62-91. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 20
    • 79957993008 scopus 로고    scopus 로고
    • Decentralizing Attribute-Based Encryption
    • Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
    • Lewko, A., Waters, B.: Decentralizing Attribute-Based Encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568-588. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6632 , pp. 568-588
    • Lewko, A.1    Waters, B.2
  • 21
    • 77957011503 scopus 로고    scopus 로고
    • Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Okamoto, T., Takashima, K.: Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 191-208. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 191-208
    • Okamoto, T.1    Takashima, K.2
  • 23
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy Identity-Based Encryption
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 24
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
    • Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
    • Waters, B.: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 90-107. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6571 , pp. 90-107
    • Waters, B.1
  • 25
    • 70350345210 scopus 로고    scopus 로고
    • Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
    • Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
    • Waters, B.: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-636. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 619-636
    • Waters, B.1
  • 26
    • 67650682832 scopus 로고    scopus 로고
    • Asymmetric Group Key Agreement
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric Group Key Agreement. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 153-170. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 153-170
    • Wu, Q.1    Mu, Y.2    Susilo, W.3    Qin, B.4    Domingo-Ferrer, J.5
  • 27
    • 79952493650 scopus 로고    scopus 로고
    • Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
    • Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. Springer, Heidelberg
    • Yamada, S., Attrapadung, N., Hanaoka, G., Kunihiro, N.: Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 90-107. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6571 , pp. 90-107
    • Yamada, S.1    Attrapadung, N.2    Hanaoka, G.3    Kunihiro, N.4
  • 28
    • 38049037296 scopus 로고    scopus 로고
    • Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
    • Katz, J., Yung, M. (eds.) ACNS 2007. Springer, Heidelberg
    • Zhang, R.: Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 323-339. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4521 , pp. 323-339
    • Zhang, R.1
  • 29
    • 80053164120 scopus 로고    scopus 로고
    • On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption
    • Zhou, Z., Huang, D.: On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption. Cryptology ePrint Archive, Report 2010/395 (2010)
    • (2010) Cryptology ePrint Archive, Report 2010/395
    • Zhou, Z.1    Huang, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.