메뉴 건너뛰기




Volumn 9, Issue 5, 2014, Pages 763-771

CP-ABE with constant-size keys for lightweight devices

Author keywords

Attribute based encryption; ciphertext policy; short decryption key.

Indexed keywords

DIGITAL STORAGE; RADIO FREQUENCY IDENTIFICATION (RFID); SECURITY OF DATA;

EID: 84898823624     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2014.2309858     Document Type: Article
Times cited : (157)

References (35)
  • 1
    • 38149038702 scopus 로고    scopus 로고
    • On privacy models for RFID
    • S. Vaudenay, "On privacy models for RFID," in Proc. ASIACRYPT, 2007, vol. 4833, pp. 68-87.
    • (2007) Proc. ASIACRYPT , vol.4833 , pp. 68-87
    • Vaudenay, S.1
  • 2
    • 57949110628 scopus 로고    scopus 로고
    • Identity-based broadcast encryption with constant size ciphertexts and private keys
    • C. Delerablée, "Identity-based broadcast encryption with constant size ciphertexts and private keys," in Proc. ASIACRYPT, 2007, vol. 4833, pp. 200-215.
    • (2007) Proc. ASIACRYPT , vol.4833 , pp. 200-215
    • Delerablée, C.1
  • 3
    • 84865578457 scopus 로고    scopus 로고
    • Identity-based traitor tracing with short private key and short ciphertext
    • F. Guo, Y. Mu, and W. Susilo, "Identity-based traitor tracing with short private key and short ciphertext," in Proc. ESORICS, 2012, vol. 7459, pp. 609-626.
    • (2012) Proc. ESORICS , vol.7459 , pp. 609-626
    • Guo, F.1    Mu, Y.2    Susilo, W.3
  • 4
    • 50049123113 scopus 로고    scopus 로고
    • Identity-based encryption: How to decrypt multiple ciphertexts using a single decryption key
    • F. Guo, Y. Mu, and Z. Chen, "Identity-based encryption: How to decrypt multiple ciphertexts using a single decryption key," in Proc. Pairing, 2007, vol. 4575, pp. 392-406.
    • (2007) Proc. Pairing , vol.4575 , pp. 392-406
    • Guo, F.1    Mu, Y.2    Chen, Z.3
  • 5
    • 54249167139 scopus 로고    scopus 로고
    • Multi-identity single-key decryption without random oracles
    • F. Guo, Y. Mu, Z. Chen, and L. Xu, "Multi-identity single-key decryption without random oracles," in Proc. Inscrypt, 2007, vol. 4990, pp. 384-398.
    • (2007) Proc. Inscrypt , vol.4990 , pp. 384-398
    • Guo, F.1    Mu, Y.2    Chen, Z.3    Xu, L.4
  • 6
    • 84876828726 scopus 로고    scopus 로고
    • Efficient and dynamic key management for multiple identities in identity-based systems
    • Feb.
    • H. Guo, C. Xu, Z. Li, Y. Yao, and Y. Mu, "Efficient and dynamic key management for multiple identities in identity-based systems," Inf. Sci., vol. 221, pp. 579-590, Feb. 2013.
    • (2013) Inf. Sci. , vol.221 , pp. 579-590
    • Guo, H.1    Xu, C.2    Li, Z.3    Yao, Y.4    Mu, Y.5
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity-Based Encryption from the Weil Pairing
    • Advances in Cryptology - CRYPTO 2001
    • D. Boneh and M. K. Franklin, "Identity-based encryption from the weil pairing," in Proc. CRYPTO, 2001, vol. 2139, pp. 213-229. (Pubitemid 33317917)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 8
    • 78649998200 scopus 로고    scopus 로고
    • Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
    • G. Wang, Q. Liu, and J. Wu, "Hierarchical attribute-based encryption for fine-grained access control in cloud storage services," in Proc. ACM Conf. Comput. Commun. Security, 2010, pp. 735-737.
    • (2010) Proc. ACM Conf. Comput. Commun. Security , pp. 735-737
    • Wang, G.1    Liu, Q.2    Wu, J.3
  • 9
    • 79957585981 scopus 로고    scopus 로고
    • Attribute-based access control with efficient revocation in data outsourcing systems,"
    • Jul.
    • J. Hur and D. K. Noh, "Attribute-based access control with efficient revocation in data outsourcing systems," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 7, pp. 1214-1221, Jul. 2011.
    • (2011) IEEE Trans. Parallel Distrib. Syst. , vol.22 , Issue.7 , pp. 1214-1221
    • Hur, J.1    Noh, D.K.2
  • 10
    • 84863392301 scopus 로고    scopus 로고
    • Hasbe: A hierarchical attributebased solution for flexible and scalable access control in cloud computing,"
    • Apr.
    • Z. Wan, J. Liu, and R. H. Deng, "Hasbe: A hierarchical attributebased solution for flexible and scalable access control in cloud computing," IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 743-754, Apr. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.2 , pp. 743-754
    • Wan, Z.1    Liu, J.2    Deng, R.H.3
  • 11
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89-98. (Pubitemid 47131359)
    • (2006) Proceedings of the ACM Conference on Computer and Communications Security , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 14
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization," in Proc. Public Key Cryptograph., 2011, vol. 6571, pp. 53-70.
    • (2011) Proc. Public Key Cryptograph. , vol.6571 , pp. 53-70
    • Waters, B.1
  • 15
    • 70350635850 scopus 로고    scopus 로고
    • A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
    • K. Emura, A. Miyaji, A. Nomura, K. Omote, and M. Soshi, "A ciphertext-policy attribute-based encryption scheme with constant ciphertext length," in Proc. ISPEC, 2009, vol. 5451, pp. 13-23.
    • (2009) Proc. ISPEC , vol.5451 , pp. 13-23
    • Emura, K.1    Miyaji, A.2    Nomura, A.3    Omote, K.4    Soshi, M.5
  • 16
    • 78650001392 scopus 로고    scopus 로고
    • On efficient ciphertext-policy attribute based encryption and broadcast encryption: Extended abstract
    • Z. Zhou and D. Huang, "On efficient ciphertext-policy attribute based encryption and broadcast encryption: Extended abstract," in Proc. ACM Conf. Comput. Commun. Security, 2010, pp. 753-755.
    • (2010) Proc. ACM Conf. Comput. Commun. Security , pp. 753-755
    • Zhou, Z.1    Huang, D.2
  • 17
    • 79952523217 scopus 로고    scopus 로고
    • Constant size ciphertexts in threshold attribute-based encryption
    • J. Herranz, F. Laguillaumie, and C. Ràfols, "Constant size ciphertexts in threshold attribute-based encryption," in Proc. Public Key Cryptography, 2010, vol. 6056, pp. 19-34.
    • (2010) Proc. Public Key Cryptography , vol.6056 , pp. 19-34
    • Herranz, J.1    Laguillaumie, F.2    Ràfols, C.3
  • 18
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
    • A. B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption," in Proc. EUROCRYPT, 2010, vol. 6110, pp. 62-91.
    • (2010) Proc. EUROCRYPT , vol.6110 , pp. 62-91
    • Lewko, A.B.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 19
    • 84865479255 scopus 로고    scopus 로고
    • New proof methods for attribute-based encryption: Achieving full security through selective techniques
    • A. B. Lewko and B. Waters, "New proof methods for attribute-based encryption: Achieving full security through selective techniques," in Proc. CRYPTO, 2012, vol. 7417, pp. 180-198.
    • (2012) Proc. CRYPTO , vol.7417 , pp. 180-198
    • Lewko, A.B.1    Waters, B.2
  • 20
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • A. Sahai and B. Waters, "Fuzzy identity-based encryption," in Proc. EUROCRYPT, 2005, vol. 3494, pp. 457-473. (Pubitemid 41313969)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 22
    • 84874307015 scopus 로고    scopus 로고
    • Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
    • C. Chen et al., "Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures," in Proc. CT-RSA, 2013, vol. 7779, pp. 50-67.
    • (2013) Proc. CT-RSA , vol.7779 , pp. 50-67
    • Chen1    Et Al., C.2
  • 23
    • 79952510987 scopus 로고    scopus 로고
    • Expressive key-policy attribute-based encryption with constant-size ciphertexts
    • N. Attrapadung, B. Libert, and E. de Panafieu, "Expressive key-policy attribute-based encryption with constant-size ciphertexts," in Proc. Public Key Cryptograph., 2011, vol. 6571, pp. 90-108.
    • (2011) Proc. Public Key Cryptograph. , vol.6571 , pp. 90-108
    • Attrapadung, N.1    Libert, B.2    De Panafieu, E.3
  • 24
    • 80053159200 scopus 로고    scopus 로고
    • Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost
    • C. Chen, Z. Zhang, and D. Feng, "Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost," in Proc. ProvSec, 2011, vol. 6980, pp. 84-101.
    • (2011) Proc. ProvSec , vol.6980 , pp. 84-101
    • Chen, C.1    Zhang, Z.2    Feng, D.3
  • 25
    • 84864803494 scopus 로고    scopus 로고
    • Threshold ciphertext policy attribute-based encryption with constant size ciphertexts
    • A. Ge, R. Zhang, C. Chen, C. Ma, and Z. Zhang, "Threshold ciphertext policy attribute-based encryption with constant size ciphertexts," in Proc. ACISP, 2012, vol. 7372, pp. 336-349.
    • (2012) Proc. ACISP , vol.7372 , pp. 336-349
    • Ge, A.1    Zhang, R.2    Chen, C.3    Ma, C.4    Zhang, Z.5
  • 26
    • 84871604439 scopus 로고    scopus 로고
    • Fully secure unbounded inner-product and attribute-based encryption
    • T. Okamoto and K. Takashima, "Fully secure unbounded inner-product and attribute-based encryption," in Proc. ASIACRYPT, 2012, vol. 7658, pp. 349-366.
    • (2012) Proc. ASIACRYPT , vol.7658 , pp. 349-366
    • Okamoto, T.1    Takashima, K.2
  • 27
    • 49049111604 scopus 로고    scopus 로고
    • Bounded ciphertext policy attribute based encryption
    • V. Goyal, A. Jain, O. Pandey, and A. Sahai, "Bounded ciphertext policy attribute based encryption," in Proc. 35th ICALP, 2008, vol. 5126, pp. 579-591.
    • (2008) Proc. 35th ICALP , vol.5126 , pp. 579-591
    • Goyal, V.1    Jain, A.2    Pandey, O.3    Sahai, A.4
  • 28
    • 84898821676 scopus 로고    scopus 로고
    • Attribute-based encryption for circuits from multilinear maps
    • abs/1210.5287
    • A. Sahai and B. Waters, "Attribute-based encryption for circuits from multilinear maps," CoRR, vol. abs/1210.5287, 2012.
    • (2012) CoRR
    • Sahai, A.1    Waters, B.2
  • 29
    • 38049078557 scopus 로고    scopus 로고
    • Multi-authority attribute based encryption
    • M. Chase, "Multi-authority attribute based encryption," in Proc. TCC, 2007, vol. 4392, pp. 515-534.
    • (2007) Proc. TCC , vol.4392 , pp. 515-534
    • Chase, M.1
  • 30
    • 45749094622 scopus 로고    scopus 로고
    • Attribute-based encryption with partially hidden encryptor-specified access structures
    • T. Nishide, K. Yoneyama, and K. Ohta, "Attribute-based encryption with partially hidden encryptor-specified access structures," in Proc. ACNS, 2008, vol. 5037, pp. 111-129.
    • (2008) Proc. ACNS , vol.5037 , pp. 111-129
    • Nishide, T.1    Yoneyama, K.2    Ohta, K.3
  • 31
    • 84873974141 scopus 로고    scopus 로고
    • Attribute-based encryption with fast decryption
    • S. Hohenberger and B. Waters, "Attribute-based encryption with fast decryption," in Proc. Public Key Cryptograph., 2013, vol. 7778, pp. 162-179.
    • (2013) Proc. Public Key Cryptograph. , vol.7778 , pp. 162-179
    • Hohenberger, S.1    Waters, B.2
  • 32
    • 84863401953 scopus 로고    scopus 로고
    • Attribute-based encryption without key cloning
    • M. J. Hinek, S. Jiang, R. Safavi-Naini, and S. F. Shahandashti, "Attribute-based encryption without key cloning," IJACT, vol. 2, no. 3, pp. 250-270, 2012.
    • (2012) IJACT , vol.2 , Issue.3 , pp. 250-270
    • Hinek, M.J.1    Jiang, S.2    Safavi-Naini, R.3    Shahandashti, S.F.4
  • 33
    • 84872101907 scopus 로고    scopus 로고
    • White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures
    • Jan.
    • Z. Liu, Z. Cao, and D. Wong, "White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures," IEEE Trans. Inf. Forensics Security, vol. 8, no. 1, pp. 76-88, Jan. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.1 , pp. 76-88
    • Liu, Z.1    Cao, Z.2    Wong, D.3
  • 34
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • E. Fujisaki and T. Okamoto, "Secure integration of asymmetric and symmetric encryption schemes," in Proc. CRYPTO, 1999, vol. 1666, pp. 537-554.
    • (1999) Proc. CRYPTO , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 35
    • 73849107877 scopus 로고    scopus 로고
    • A taxonomy of pairing-friendly elliptic curves
    • Freeman, M. Scott, E. Teske
    • D. Freeman, M. Scott, and E. Teske, "A taxonomy of pairing-friendly elliptic curves," J. Cryptol., vol. 23, no. 2, pp. 224-280, 2010.
    • (2010) J. Cryptol. , vol.23 , Issue.2 , pp. 224-280


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.