A fully distributed hierarchical attribute-based encryption scheme
نویسندگان
چکیده
منابع مشابه
A Fully Secure Attribute Based Broadcast Encryption Scheme
Besides traditional functionality of broadcast encryption, attribute based broadcast encryption (ABBE) provides more flexible assess control mechanism over encrypted data. In this paper, a ciphertext-policy ABBE (CPABBE) scheme is proposed. In such scheme, user’s private key is attached with attributes and an index while ciphertext is associated with an access structure and a broadcast set. A k...
متن کاملDistributed Attribute-Based Encryption
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows to encrypt data under an access policy, specified as a logical combination of attributes. Such ciphertexts can be decrypted by anyone with a set of attributes that fits the policy. In this paper, we introduce the concept of Distributed Attribute-Based Encryption (DABE), where an arbitrary number of parties can be present to maintain a...
متن کاملFully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
In this paper, we present two fully secure functional encryption schemes. Our first resultis a fully secure attribute-based encryption (ABE) scheme. Previous constructions of ABEwere only proven to be selectively secure. We achieve full security by adapting the dualsystem encryption methodology recently introduced by Waters and previously leveraged toobtain fully secure IBE ...
متن کاملAttribute-Based Broadcast Encryption Scheme Made Efficient
In this paper, we describe a new broadcast encryption scheme for stateless receivers. The main difference between our scheme and the classical ones derived from the complete subtree paradigm is that the group of privileged users is described by attributes. Actually, some real applications have been described where the use of a more adaptable access structure brings more efficiency and ease of d...
متن کاملCiphertext-Policy Attribute-Based Broadcast Encryption Scheme
In this work, we design a new attribute-based encryption scheme with the revocation capability. In the proposed schemes, the user (broadcaster) encrypts the data according to an access policy over the set of attributes, and a list of the identities of revoked users. Only recipients who have attributes which satisfy the access policy and whose identity is not in the list of revoked users will be...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Theoretical Computer Science
سال: 2020
ISSN: 0304-3975
DOI: 10.1016/j.tcs.2020.02.030