메뉴 건너뛰기




Volumn 23, Issue 11, 2012, Pages 2150-2162

Privacy-preserving decentralized key-policy attribute-based encryption

Author keywords

access control; Attribute based encryption; multiauthority; privacy; privacy preserving extract protocol

Indexed keywords

COLLABORATIVE COMPUTATION; COLLUSION ATTACK; COMMUNICATION COST; COMPLEXITY ASSUMPTIONS; DIFFIE HELLMAN; GLOBAL IDENTIFIERS; MULTIAUTHORITY; PRIVACY PRESERVING; RESEARCH PROBLEMS; SECRET KEY;

EID: 84867290573     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2012.50     Document Type: Article
Times cited : (172)

References (39)
  • 1
    • 0028514601 scopus 로고
    • Kerberos: An authentication sewice for computer networks
    • Sept.
    • B.C. Neuman and T. Ts'o, "Kerberos: An Authentication Sewice for Computer Networks," IEEE Comm. Magazine, vol. 32, no. 9, pp. 33-38, Sept. 1994.
    • (1994) IEEE Comm. Magazine , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.C.1    Ts'O, T.2
  • 3
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption
    • DOI 10.1109/SP.2007.11, 4223236, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
    • J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-Policy Attribute-Based Encryption," Proc. IEEE Symp. Security and Privacy (S&P '07), pp. 321-34, May 2007. (Pubitemid 47432538)
    • (2007) Proceedings - IEEE Symposium on Security and Privacy , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 4
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • A. Sahai and B. Waters, "Fuzzy Identity-Based Encryption," EUROCRYPT '05: Proc. Advances in Cryptology, R. Cramer, ed., pp. 457-473, May 2005. (Pubitemid 41313969)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 5
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • S.P. Vadhan, ed. Feb.
    • M. Chase, "Multi-Authority Attribute Based Encryption," Proc. Theory of Cryptography Conf. (TCC '07), S.P. Vadhan, ed., pp. 515-534, Feb. 2007.
    • (2007) Proc. Theory of Cryptography Conf. (TCC '07) , pp. 515-534
    • Chase, M.1
  • 7
    • 58749115565 scopus 로고    scopus 로고
    • Secure threshold multi-authority attribute based encryption without a central authority
    • D.R. Chowdhury V. Rijmen, and A. Das, eds. Dec.
    • H. Lin, Z. Cao, X. Liang, and J. Shao, "Secure Threshold Multi-Authority Attribute Based Encryption without a Central Authority," INDOCRYPT '08: Proc. Int'l Conf. Cryptology in India, D.R. Chowdhury, V. Rijmen, and A. Das, eds., pp. 426-436, Dec. 2008.
    • (2008) INDOCRYPT '08: Proc. Int'l Conf. Cryptology in India , pp. 426-436
    • Lin, H.1    Cao, Z.2    Liang, X.3    Shao, J.4
  • 10
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Advances in Cryptology - CRYPTO 2001
    • D. Boneh and M.K. Franklin, "Identity-Based Encryption from the Weil Pairing," CRYPTO '01: Proc. Advances in Cryptology, J. Kilian, ed., pp. 213-229, Aug. 2001. (Pubitemid 33317917)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 11
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • G.R. Blakley and D. Chaum, eds. Aug.
    • A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," CRYPTO '84: Proc. Advances in Cryptology, G.R. Blakley and D. Chaum, eds., pp. 47-53, Aug. 1985.
    • (1985) CRYPTO '84: Proc. Advances in Cryptology , pp. 47-53
    • Shamir, A.1
  • 13
    • 24944566040 scopus 로고    scopus 로고
    • Efficient Identity-Based Encryption without random oracles
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • B. Waters, "Efficient Identity-Based Encryption without Random Oracles," EUROCRYPT '05: Proc. Advances in Cryptology, R. Cramer, ed., pp. 114-127, May 2005. (Pubitemid 41313949)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 114-127
    • Waters, B.1
  • 14
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-id secure identity-based encryption without random oracles
    • C. Cachin and J. Camenisch, eds. May
    • D. Boneh and X. Boyen, "Efficient Selective-Id Secure Identity-Based Encryption without Random Oracles," EUROCRYP '04: Proc. Advances in Cryptology, C. Cachin and J. Camenisch, eds., pp. 223-238, May 2004.
    • (2004) EUROCRYP '04: Proc. Advances in Cryptology , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 15
    • 74049163235 scopus 로고    scopus 로고
    • Improving privacy and security in multi-authority attribute-based encryption
    • E. Al-Shaer, S. Jha, and A.D. Keromytis, eds. Nov.
    • M. Chase and S.S. Chow, "Improving Privacy and Security in Multi-Authority Attribute-Based Encryption," Proc. ACM Conf. Computer and Comm. Security (CCS '09), E. Al-Shaer, S. Jha, and A.D. Keromytis, eds., pp. 121-130, Nov. 2009.
    • (2009) Proc. ACM Conf. Computer and Comm. Security (CCS '09) , pp. 121-130
    • Chase, M.1    Chow, S.S.2
  • 16
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data," Proc. ACM Conf. Computer and Comm. Security (CCS '06), A. Juels, R.N. Wright, and S.D.C. di Vimercati, eds., pp. 89-98, Oct./Nov. 2006. (Pubitemid 47131359)
    • (2006) Proceedings of the ACM Conference on Computer and Communications Security , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 17
    • 74049120601 scopus 로고    scopus 로고
    • Attribute-based encryption with non-monotonic access structures
    • P. Ning, S.D.C. di Vimercati, and P.F. Syverson, eds. Oct.
    • R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-Based Encryption with Non-Monotonic Access Structures," Proc. ACM Conf. Computer and Comm. Security (CCS '07), P. Ning, S.D.C. di Vimercati, and P.F. Syverson, eds., pp. 195-203, Oct. 2007.
    • (2007) Proc. ACM Conf. Computer and Comm. Security (CCS '07) , pp. 195-203
    • Ostrovsky, R.1    Sahai, A.2    Waters, B.3
  • 18
    • 45749116552 scopus 로고    scopus 로고
    • Provably secure ciphertext policy abe
    • P. Ning, S.D.C. di Vimercati, and P.F. Syverson, eds. Oct.
    • L. Cheung and C. Newport, "Provably Secure Ciphertext Policy Abe," Proc. ACM Conf. Computer and Comm. Security (CCS '07), P. Ning, S.D.C. di Vimercati, and P.F. Syverson, eds., pp. 456-465, Oct. 2007.
    • (2007) Proc. ACM Conf. Computer and Comm. Security (CCS '07) , pp. 456-465
    • Cheung, L.1    Newport, C.2
  • 19
    • 79952523217 scopus 로고    scopus 로고
    • Constant size ciphertexts in threshold attribute-based encryption
    • P.Q. Nguyen and D. Pointcheval, eds. May
    • J. Herranz, F. Laguillaumie, and C. Rá fols, "Constant Size Ciphertexts in Threshold Attribute-Based Encryption," Proc. Public Key Cryptography (PKC '10), P.Q. Nguyen and D. Pointcheval, eds., pp. 19-34, May 2010.
    • (2010) Proc. Public Key Cryptography (PKC '10) , pp. 19-34
    • Herranz, J.1    Laguillaumie, F.2    Rá Fols, C.3
  • 20
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (Hierarchical) inner product encryption
    • H. Gilbert, ed. May/June
    • A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption," EUROCRYPT '10: Proc. Advances in Cryptology, H. Gilbert, ed., pp. 62-91, May/June 2010.
    • (2010) EUROCRYPT '10: Proc. Advances in Cryptology , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 21
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • D. Catalano, N. Fazio, R. Gennaro, and A. Nicolosi, eds. Mar. 6-9
    • B. Waters, "Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization," Proc. 14th Int'l Conf. Practice and Theory in Public Key Cryptography Conf. Public Key Cryptography (PKC '11), D. Catalano, N. Fazio, R. Gennaro, and A. Nicolosi, eds., pp. 53-70, Mar. 6-9 2011.
    • (2011) Proc. 14th Int'l Conf. Practice and Theory in Public Key Cryptography Conf. Public Key Cryptography (PKC '11) , pp. 53-70
    • Waters, B.1
  • 25
    • 79952071204 scopus 로고    scopus 로고
    • FDAC: Toward fine-grained data access control in wireless sensor networks
    • Apr.
    • S. Yu, K. Ren, and W. Lou, "FDAC: Toward Fine-Grained Data Access Control in Wireless Sensor Networks," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 4, pp. 673-686, Apr. 2011.
    • (2011) IEEE Trans. Parallel and Distributed Systems , vol.22 , Issue.4 , pp. 673-686
    • Yu, S.1    Ren, K.2    Lou, W.3
  • 26
    • 79957585981 scopus 로고    scopus 로고
    • Attribute-based access control with efficient revocation in data outsourcing systems
    • July
    • J. Hur and D.K. Noh, "Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems," IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 7, pp. 1214-1221, July 2011.
    • (2011) IEEE Trans. Parallel and Distributed Systems , vol.22 , Issue.7 , pp. 1214-1221
    • Hur, J.1    Noh, D.K.2
  • 27
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • Mar.
    • S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing," Proc. IEEE INFOCOM '10, pp. 534-542, Mar. 2010.
    • (2010) Proc. IEEE INFOCOM '10 , pp. 534-542
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 31
    • 69649105305 scopus 로고    scopus 로고
    • On multi-authority ciphertext-policy attribute-based encryption
    • S. Mü ller, S. Katzenbeisser, and C. Eckert, "On Multi-Authority Ciphertext-Policy Attribute-Based Encryption," Bull. of the Korean Math. Soc., vol. 46, no. 4, pp. 803-819, 2009.
    • (2009) Bull. of the Korean Math. Soc. , vol.46 , Issue.4 , pp. 803-819
    • Müller, S.1    Katzenbeisser, S.2    Eckert, C.3
  • 37
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • DOI 10.1145/4372.4373
    • D. Chaum, "Security without Identification: Transaction Systems to Make Big Brother Obsolete," Comm. ACM, vol. 28, no. 10, pp. 1030-1044, 1985. (Pubitemid 15587967)
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum David1
  • 38
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • J. Camenisch and A. Lysyanskaya, "An Efficient System for Non-Transferable Anonymous Credentials with Optional Anonymity Revocation," EUROCRYPT '01: Proc. Int'l Conf. the Theory and Application of Cryptographic Techniques: Advances in Cryptology, B. Pfitzmann, ed., pp. 93-118, May 2001. (Pubitemid 33275827)
    • (2001) Lecture Notes in Computer Science , Issue.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.