메뉴 건너뛰기




Volumn 9722, Issue , 2016, Pages 495-508

Chosen ciphertext secure attribute-based encryption with outsourced decryption

Author keywords

Attribute based encryption; Chosen ciphertext security; Outsourced decryption; Random oracle model

Indexed keywords

MOBILE DEVICES; SECURITY OF DATA;

EID: 84978287530     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-40253-6_30     Document Type: Conference Paper
Times cited : (6)

References (22)
  • 1
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption
    • Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE S&P 2007, pp. 321-334 (2007)
    • (2007) IEEE S&P 2007 , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 2
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Nyberg, K. (ed.), Springer, Heidelberg
    • Blaze, M., Bleumer, G., Strauss, M.J.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
    • (1998) EUROCRYPT 1998. LNCS , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.J.3
  • 3
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • Cachin, C., Camenisch, J.L. (eds.), Springer, Heidelberg
    • Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004. LNCS , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 4
    • 45749116552 scopus 로고    scopus 로고
    • Provably secure ciphertext policy ABE
    • Cheung, L., Newport, C.: Provably secure ciphertext policy ABE. In: ACM CCS 2007, pp. 456-465 (2007)
    • (2007) ACM CCS 2007 , pp. 456-465
    • Cheung, L.1    Newport, C.2
  • 5
    • 84955339164 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • Wiener, M. (ed.), Springer, Heidelberg
    • Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537-554. Springer, Heidelberg (1999)
    • (1999) CRYPTO 1999. LNCS , vol.1666 , pp. 537-554
    • Fujisaki, E.1    Okamoto, T.2
  • 6
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine grained access control of encrypted data
    • Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine grained access control of encrypted data. In: ACM CCS 2006, pp. 89-98 (2006)
    • (2006) ACM CCS 2006 , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 7
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for finegrained access control of encrypted data
    • Juels, A.,Wright, R.N., De Capitani di Vimercati, S. (eds.), ACM
    • Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for finegrained access control of encrypted data. In: Juels, A.,Wright, R.N., De Capitani di Vimercati, S. (eds.) ACM Conference on Computer and Communications Security, pp. 89-98. ACM (2006)
    • (2006) ACM Conference on Computer and Communications Security , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 9
    • 84883113038 scopus 로고    scopus 로고
    • Energy provisioning in wireless rechargeable sensor networks
    • He, S., Chen, J., Jiang, F., Yau, D.K.Y., Xing, G., Sun, Y.: Energy provisioning in wireless rechargeable sensor networks. IEEE Trans. Mob. Comput. 12(10), 1931-1942 (2013)
    • (2013) IEEE Trans. Mob. Comput , vol.12 , Issue.10 , pp. 1931-1942
    • He, S.1    Chen, J.2    Jiang, F.3    Yau, D.K.Y.4    Xing, G.5    Sun, Y.6
  • 10
    • 84880652100 scopus 로고    scopus 로고
    • Attribute-based encryption with verifiable outsourced decryption
    • Lai, C.G.J., Deng, R.H., Weng, J.: Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 8(8), 1343-1354 (2013)
    • (2013) IEEE Trans. Inf. Forensics Secur , vol.8 , Issue.8 , pp. 1343-1354
    • Lai, C.G.J.1    Deng, R.H.2    Weng, J.3
  • 11
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
    • Gilbert, H. (ed.), Springer, Heidelberg
    • Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62-91. Springer, Heidelberg (2010)
    • (2010) EUROCRYPT 2010. LNCS , vol.6110 , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 12
    • 84894634556 scopus 로고    scopus 로고
    • Securely outsourcing attribute-based encryption with checkability
    • Li, J., Huang, X., Li, J., Chen, X., Xiang, Y.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25(8), 2201-2210 (2014)
    • (2014) IEEE Trans. Parallel Distrib. Syst , vol.25 , Issue.8 , pp. 2201-2210
    • Li, J.1    Huang, X.2    Li, J.3    Chen, X.4    Xiang, Y.5
  • 13
    • 84939231120 scopus 로고    scopus 로고
    • Revisiting attribute-based encryption with verifiable outsourced decryption
    • Lin, S., Zhang, R., Ma, H., Wang, M.: Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10(10), 2119-2130 (2015)
    • (2015) IEEE Trans. Inf. Forensics Secur , vol.10 , Issue.10 , pp. 2119-2130
    • Lin, S.1    Zhang, R.2    Ma, H.3    Wang, M.4
  • 14
    • 84978311252 scopus 로고    scopus 로고
    • Generic and efficient constructions of attribute-based encryptionwith verifiable outsourced decryption
    • Mao, X., Lai, J., Mei, Q., Chen, K., Weng, J.: Generic and efficient constructions of attribute-based encryptionwith verifiable outsourced decryption. IEEE Trans. Dependable Secur. Comput. (99), 1 (2015)
    • (2015) IEEE Trans. Dependable Secur. Comput , Issue.99 , pp. 1
    • Mao, X.1    Lai, J.2    Mei, Q.3    Chen, K.4    Weng, J.5
  • 15
    • 74049120601 scopus 로고    scopus 로고
    • Attribute-based encryption with nonmonotonic access structures
    • Ostrovsky, R., Sahai, A., Waters, B.: Attribute-based encryption with nonmonotonic access structures. In: ACM CCS 2007, pp. 195-203 (2007)
    • (2007) ACM CCS 2007 , pp. 195-203
    • Ostrovsky, R.1    Sahai, A.2    Waters, B.3
  • 17
    • 84930201567 scopus 로고    scopus 로고
    • Attribute-based encryption with efficient verifiable outsourced decryption
    • Qin, B., Deng, R.H., Liu, S., Ma, S.: Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 10(7), 1384-1393 (2015)
    • (2015) IEEE Trans. Inf. Forensics Secur , vol.10 , Issue.7 , pp. 1384-1393
    • Qin, B.1    Deng, R.H.2    Liu, S.3    Ma, S.4
  • 18
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Cramer, R. (ed.), Springer, Heidelberg
    • Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
    • (2005) EUROCRYPT 2005. LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 19
    • 77957011503 scopus 로고    scopus 로고
    • Fully secure functional encryption with general relations from the decisional linear assumption
    • Rabin, T. (ed.), Springer, Heidelberg
    • Okamoto, T., Takashima, K.: Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 191-208. Springer, Heidelberg (2010)
    • (2010) CRYPTO 2010. LNCS , vol.6223 , pp. 191-208
    • Okamoto, T.1    Takashima, K.2
  • 20
    • 84871604439 scopus 로고    scopus 로고
    • Fully secure unbounded inner-product and attributebased encryption
    • Wang, X., Sako, K. (eds.), Springer, Heidelberg
    • Okamoto, T., Takashima, K.: Fully secure unbounded inner-product and attributebased encryption. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 349-366. Springer, Heidelberg (2012)
    • (2012) ASIACRYPT 2012. LNCS , vol.7658 , pp. 349-366
    • Okamoto, T.1    Takashima, K.2
  • 21
    • 70350345210 scopus 로고    scopus 로고
    • Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
    • Halevi, S. (ed.), Springer, Heidelberg
    • Waters, B.: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-636. Springer, Heidelberg (2009)
    • (2009) CRYPTO 2009. LNCS , vol.5677 , pp. 619-636
    • Waters, B.1
  • 22
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.), Springer, Heidelberg
    • Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53-70. Springer, Heidelberg (2011)
    • (2011) PKC 2011. LNCS , vol.6571 , pp. 53-70
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.