메뉴 건너뛰기




Volumn 15, Issue 3, 2013, Pages 131-140

An expressive decentralizing KP-ABE scheme with constant-size ciphertext

Author keywords

Access structure; Attribute based encryption; Constant ciphertext size; Decentralizing

Indexed keywords

ACCESS POLICIES; ACCESS STRUCTURE; ATTRIBUTE-BASED ENCRYPTION SCHEMES; ATTRIBUTE-BASED ENCRYPTIONS; CIPHERTEXTS; DECENTRALIZING; MODEL-BASED OPC; MULTI AUTHORITIES;

EID: 84875263535     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (22)

References (25)
  • 2
    • 0003745894 scopus 로고    scopus 로고
    • Secure schemes for secret sharing and key distribution
    • Haifa, Israel
    • A. Beimel, "Secure schemes for secret sharing and key distribution," Israel Institute of Technology, Haifa, Israel, 1996.
    • (1996) Israel Institute of Technology
    • Beimel, A.1
  • 6
    • 84875247383 scopus 로고    scopus 로고
    • On the existence of distortion maps on ordinary elliptic curves
    • D. Charles, "On the existence of distortion maps on ordinary elliptic curves," IACR Cryptology ePrint Archive, 2006.
    • (2006) IACR Cryptology ePrint Archive
    • Charles, D.1
  • 7
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • Amsterdam, The Netherlands, February
    • M. Chase, "Multi-authority attribute based encryption," in Theory of Cryptography (TCC 2007), pp. 515-534, Amsterdam, The Netherlands, February 2007.
    • (2007) Theory of Cryptography (TCC 2007) , pp. 515-534
    • Chase, M.1
  • 9
    • 80053159200 scopus 로고    scopus 로고
    • E±cient ciphertext policy attribute-based encryption with constantsize ciphertext and constant computation-cost
    • Xi'an, China, October
    • C. Chen, Z. Zhang, and D. Feng, "E±cient ciphertext policy attribute-based encryption with constantsize ciphertext and constant computation-cost," in Proceedings of 5th International Conference, ProvSec 2011, pp. 84-101, Xi'an, China, October 2011.
    • (2011) Proceedings of 5th International Conference, ProvSec 2011 , pp. 84-101
    • Chen, C.1    Zhang, Z.2    Feng, D.3
  • 11
    • 84875265201 scopus 로고    scopus 로고
    • New privacy-preserving architectures for identity-/attribute-based encryption
    • S. S. M. Chow, "New privacy-preserving architectures for identity-/attribute-based encryption," New York University, 2010.
    • (2010) New York University
    • Chow, S.S.M.1
  • 16
    • 79956000593 scopus 로고    scopus 로고
    • A2be: Accountable attribute-based encryption for abuse free access control
    • J. Li, K. Ren, and K. Kim, "A2be: Accountable attribute-based encryption for abuse free access control," IACR Cryptology ePrint Archive, 2009.
    • (2009) IACR Cryptology ePrint Archive
    • Li, J.1    Ren, K.2    Kim, K.3
  • 20
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 158-164, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 158-164
    • Rivest, R.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.