메뉴 건너뛰기




Volumn , Issue , 2013, Pages 463-474

Practical constructions and new proof methods for large universe attribute-based encryption

Author keywords

attribute based encryption; charm; ciphertext policy; key policy; large universe; q type assumptions; unbounded

Indexed keywords

ATTRIBUTE-BASED ENCRYPTIONS; CHARM; CIPHERTEXT POLICIES; KEY POLICIES; LARGE UNIVERSE; Q-TYPE ASSUMPTIONS; UNBOUNDED;

EID: 84889034631     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2508859.2516672     Document Type: Conference Paper
Times cited : (410)

References (43)
  • 1
    • 84870632681 scopus 로고    scopus 로고
    • Charm: A framework for rapidly prototyping cryptosystems
    • Report 2011/617
    • Joseph A. Akinyele, Matthew Green, and Avi Rubin. Charm: A framework for rapidly prototyping cryptosystems. Cryptology ePrint Archive, Report 2011/617, 2011. http://eprint.iacr.org/.
    • (2011) Cryptology ePrint Archive
    • Akinyele, J.A.1    Green, M.2    Rubin, A.3
  • 2
    • 33749033076 scopus 로고    scopus 로고
    • Escrow-free encryption supporting cryptographic workflow
    • Sattam S. Al-Riyami, John Malone-Lee, and Nigel P. Smart. Escrow-free encryption supporting cryptographic workflow. Int. J. Inf. Sec., 5(4):217-229, 2006.
    • (2006) Int. J. Inf. Sec. , vol.5 , Issue.4 , pp. 217-229
    • Al-Riyami, S.S.1    Malone-Lee, J.2    Smart, N.P.3
  • 3
    • 34247329524 scopus 로고    scopus 로고
    • Policy-based encryption schemes from bilinear pairings
    • Walid Bagga, Refik Molva, and Stefano Crosta. Policy-based encryption schemes from bilinear pairings. In ASIACCS, page 368, 2006.
    • (2006) ASIACCS , pp. 368
    • Bagga, W.1    Molva, R.2    Crosta, S.3
  • 4
    • 84973899018 scopus 로고    scopus 로고
    • Secure cryptographic workflow in the standard model
    • Manuel Barbosa and Pooya Farshim. Secure cryptographic workflow in the standard model. In INDOCRYPT, pages 379-393, 2006.
    • (2006) INDOCRYPT , pp. 379-393
    • Barbosa, M.1    Farshim, P.2
  • 7
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-id secure identity-based encryption without random oracles
    • Dan Boneh and Xavier Boyen. Efficient selective-id secure identity-based encryption without random oracles. In EUROCRYPT, pages 223-238, 2004.
    • (2004) EUROCRYPT , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 8
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Dan Boneh and Matthew K. Franklin. Identity-based encryption from the Weil pairing. In CRYPTO, pages 213-229, 2001.
    • (2001) CRYPTO , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 9
    • 43149116953 scopus 로고    scopus 로고
    • Space-efficient identity based encryption without pairings
    • Dan Boneh, Craig Gentry, and Michael Hamburg. Space-efficient identity based encryption without pairings. In FOCS, pages 647-657, 2007.
    • (2007) FOCS , pp. 647-657
    • Boneh, D.1    Gentry, C.2    Hamburg, M.3
  • 10
    • 79953230454 scopus 로고    scopus 로고
    • Functional encryption: Definitions and challenges
    • Dan Boneh, Amit Sahai, and Brent Waters. Functional encryption: Definitions and challenges. In TCC, pages 253-273, 2011.
    • (2011) TCC , pp. 253-273
    • Boneh, D.1    Sahai, A.2    Waters, B.3
  • 12
    • 84888984299 scopus 로고    scopus 로고
    • Charm. http://www.charm-crypto.com.
  • 13
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • Melissa Chase. Multi-authority attribute based encryption. In TCC, pages 515-534, 2007.
    • (2007) TCC , pp. 515-534
    • Chase, M.1
  • 14
    • 74049163235 scopus 로고    scopus 로고
    • Improving privacy and security in multi-authority attribute-based encryption
    • Melissa Chase and Sherman S. M. Chow. Improving privacy and security in multi-authority attribute-based encryption. In ACM Conference on Computer and Communications Security, pages 121-130, 2009.
    • (2009) ACM Conference on Computer and Communications Security , pp. 121-130
    • Chase, M.1    Chow, S.S.M.2
  • 16
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Clifford Cocks. An identity based encryption scheme based on quadratic residues. In IMA Int. Conf., pages 360-363, 2001.
    • (2001) IMA Int. Conf. , pp. 360-363
    • Cocks, C.1
  • 17
    • 77954639466 scopus 로고    scopus 로고
    • Converting pairing-based cryptosystems from composite-order groups to prime-order groups
    • David Mandell Freeman. Converting pairing-based cryptosystems from composite-order groups to prime-order groups. In EUROCRYPT, pages 44-61, 2010.
    • (2010) EUROCRYPT , pp. 44-61
    • Freeman, D.M.1
  • 18
    • 33746062799 scopus 로고    scopus 로고
    • Practical identity-based encryption without random oracles
    • Craig Gentry. Practical identity-based encryption without random oracles. In EUROCRYPT, pages 445-464, 2006.
    • (2006) EUROCRYPT , pp. 445-464
    • Gentry, C.1
  • 19
    • 49049111604 scopus 로고    scopus 로고
    • Bounded ciphertext policy attribute based encryption
    • Vipul Goyal, Abhishek Jain, Omkant Pandey, and Amit Sahai. Bounded ciphertext policy attribute based encryption. In ICALP (2), pages 579-591, 2008.
    • (2008) ICALP (2) , pp. 579-591
    • Goyal, V.1    Jain, A.2    Pandey, O.3    Sahai, A.4
  • 21
    • 44449129423 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • Jonathan Katz, Amit Sahai, and Brent Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In EUROCRYPT, pages 146-162, 2008.
    • (2008) EUROCRYPT , pp. 146-162
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 22
    • 84859952520 scopus 로고    scopus 로고
    • Tools for simulating features of composite order bilinear groups in the prime order setting
    • Allison B. Lewko. Tools for simulating features of composite order bilinear groups in the prime order setting. In EUROCRYPT, pages 318-335, 2012.
    • (2012) EUROCRYPT , pp. 318-335
    • Lewko, A.B.1
  • 23
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
    • Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In EUROCRYPT, pages 62-91, 2010.
    • (2010) EUROCRYPT , pp. 62-91
    • Lewko, A.B.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 24
    • 79957993008 scopus 로고    scopus 로고
    • Decentralizing attribute-based encryption
    • Allison B. Lewko and Brent Waters. Decentralizing attribute-based encryption. In EUROCRYPT, pages 568-588, 2011.
    • (2011) EUROCRYPT , pp. 568-588
    • Lewko, A.B.1    Waters, B.2
  • 25
    • 79958006339 scopus 로고    scopus 로고
    • Unbounded HIBE and attribute-based encryption
    • Allison B. Lewko and Brent Waters. Unbounded HIBE and attribute-based encryption. In EUROCRYPT, pages 547-567, 2011.
    • (2011) EUROCRYPT , pp. 547-567
    • Lewko, A.B.1    Waters, B.2
  • 26
    • 84865479255 scopus 로고    scopus 로고
    • New proof methods for attribute-based encryption: Achieving full security through selective techniques
    • Allison B. Lewko and Brent Waters. New proof methods for attribute-based encryption: Achieving full security through selective techniques. In CRYPTO, pages 180-198, 2012.
    • (2012) CRYPTO , pp. 180-198
    • Lewko, A.B.1    Waters, B.2
  • 28
    • 85009120801 scopus 로고    scopus 로고
    • Controlling access to published data using cryptography
    • Gerome Miklau and Dan Suciu. Controlling access to published data using cryptography. In VLDB, pages 898-909, 2003.
    • (2003) VLDB , pp. 898-909
    • Miklau, G.1    Suciu, D.2
  • 29
    • 84959046713 scopus 로고    scopus 로고
    • Characterization of elliptic curve traces under fr-reduction
    • Atsuko Miyaji, Masaki Nakabayashi, and Shunzo Takano. Characterization of elliptic curve traces under fr-reduction. In ICISC, pages 90-108, 2000.
    • (2000) ICISC , pp. 90-108
    • Miyaji, A.1    Nakabayashi, M.2    Takano, S.3
  • 30
    • 52149087229 scopus 로고    scopus 로고
    • Homomorphic encryption and signatures from vector decomposition
    • Tatsuaki Okamoto and Katsuyuki Takashima. Homomorphic encryption and signatures from vector decomposition. In Pairing, pages 57-74, 2008.
    • (2008) Pairing , pp. 57-74
    • Okamoto, T.1    Takashima, K.2
  • 31
    • 72449208663 scopus 로고    scopus 로고
    • Hierarchical predicate encryption for inner-products
    • Tatsuaki Okamoto and Katsuyuki Takashima. Hierarchical predicate encryption for inner-products. In ASIACRYPT, pages 214-231, 2009.
    • (2009) ASIACRYPT , pp. 214-231
    • Okamoto, T.1    Takashima, K.2
  • 32
    • 77957011503 scopus 로고    scopus 로고
    • Fully secure functional encryption with general relations from the decisional linear assumption
    • Tatsuaki Okamoto and Katsuyuki Takashima. Fully secure functional encryption with general relations from the decisional linear assumption. In CRYPTO, pages 191-208, 2010.
    • (2010) CRYPTO , pp. 191-208
    • Okamoto, T.1    Takashima, K.2
  • 33
    • 84871604439 scopus 로고    scopus 로고
    • Fully secure unbounded inner-product and attribute-based encryption
    • Tatsuaki Okamoto and Katsuyuki Takashima. Fully secure unbounded inner-product and attribute-based encryption. In ASIACRYPT, pages 349-366, 2012.
    • (2012) ASIACRYPT , pp. 349-366
    • Okamoto, T.1    Takashima, K.2
  • 36
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Amit Sahai and Brent Waters. Fuzzy identity-based encryption. In EUROCRYPT, pages 457-473, 2005.
    • (2005) EUROCRYPT , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 37
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Adi Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO, pages 47-53, 1984.
    • (1984) CRYPTO , pp. 47-53
    • Shamir, A.1
  • 38
    • 70350649061 scopus 로고    scopus 로고
    • Predicate privacy in encryption systems
    • Emily Shen, Elaine Shi, and Brent Waters. Predicate privacy in encryption systems. In TCC, pages 457-473, 2009.
    • (2009) TCC , pp. 457-473
    • Shen, E.1    Shi, E.2    Waters, B.3
  • 39
    • 49049104392 scopus 로고    scopus 로고
    • Delegating capabilities in predicate encryption systems
    • Elaine Shi and Brent Waters. Delegating capabilities in predicate encryption systems. In ICALP (2), pages 560-578, 2008.
    • (2008) ICALP (2) , pp. 560-578
    • Shi, E.1    Waters, B.2
  • 40
    • 35248891001 scopus 로고    scopus 로고
    • Access control using pairing based cryptography
    • Nigel P. Smart. Access control using pairing based cryptography. In CT-RSA, pages 111-121, 2003.
    • (2003) CT-RSA , pp. 111-121
    • Smart, N.P.1
  • 42
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Brent Waters. Efficient identity-based encryption without random oracles. In EUROCRYPT, pages 114-127, 2005.
    • (2005) EUROCRYPT , pp. 114-127
    • Waters, B.1
  • 43
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • Brent Waters. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Public Key Cryptography, pages 53-70, 2011.
    • (2011) Public Key Cryptography , pp. 53-70
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.