منابع مشابه
Attribute-Based Encryption for Arithmetic Circuits
We present an Attribute Based Encryption system where access policies are expressed as polynomial size arithmetic circuits. We prove security against arbitrary collusions of users based on the learning with errors problem on integer lattices. The system has two additional useful properties: first, it naturally handles arithmetic circuits with arbitrary fan-in (and fan-out) gates. Second, secret...
متن کاملAttribute-Based Encryption for Circuits from Multilinear Maps
In this work, we provide the first construction of Attribute-Based Encryption (ABE) for general circuits. Our construction is based on the existence of multilinear maps. We prove selective security of our scheme in the standard model under the natural multilinear generalization of the BDDH assumption. Our scheme achieves both Key-Policy and Ciphertext-Policy variants of ABE. Our scheme and its ...
متن کاملOn Attribute-Based Encryption for Circuits from Multilinear Maps
Author: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . " . . . . . . " May 2013 Supervisor: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . " . . . . . . " May 2013 Supervisor: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . " . . . . . . " May 2013 Approved for defence Professor: . . . . . . . . . . . . . . . . . ...
متن کاملAttribute-based encryption implies identity-based encryption
In this short paper we formally prove that designing attribute-based encryption schemes cannot be easier than designing identity-based encryption schemes. In more detail, we show how an attribute-based encryption scheme which admits, at least, AND policies can be combined with a collision-resistant hash function to obtain an identity-based encryption scheme. Even if this result may seem natural...
متن کاملAttribute-Based Encryption from Identity-Based Encryption
Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data provider encrypts a secret message and then sends the ciphertext to the receivers according to the access policy which she/he decides. If the attributes of the receivers match the access policy, then they can decrypt the ciphertext. This manuscript shows a relation between ABE and identity-based en...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the ACM
سال: 2015
ISSN: 0004-5411,1557-735X
DOI: 10.1145/2824233