Ciphertext policy Attribute based Encryption with anonymous access policy

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ciphertext Policy Attribute based Encryption with anonymous access policy

In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt the encrypted message. The policy can be formed with the help of attributes. In CP-ABE, access policy is sent along with the ciphertext. We propose a method in which the access policy need not be sent along with the ciphertext, by which we are able to preserve the privacy of the encryptor. ...

متن کامل

Recipient Anonymous Ciphertext-Policy Attribute-based Broadcast Encryption

The ciphertext-policy (CP) attribute-based broadcast encryption (CP-ABBE) is a more flexible broadcast encryption (BE), in which the broadcaster encrypts the data with an access policy and a receiver set. Only receivers in the valid set who satisfy the access policy will be able to decrypt the ciphertext. However, most existing CPABBE schemes only pay attention to plaintext privacy rather than ...

متن کامل

Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy

Attribute-based encryption (ABE) is an extension of traditional public key encryption in which the encryption and decryption phases are based on user’s attributes. More precisely, we focus on ciphertext-policy ABE (CP-ABE) where the secret-key is associated to a set of attributes and the ciphertext is generated with an access policy. It then becomes feasible to decrypt a ciphertext only if one’...

متن کامل

Adaptable Ciphertext-Policy Attribute-Based Encryption

In this paper, we introduce a new cryptographic primitive, called adaptable ciphertext-policy attribute-based encryption (CP-ABE). Adaptable CP-ABE extends the traditional CP-ABE by allowing a semitrusted proxy to modify a ciphertext under one access policy into ciphertexts of the same plaintext under any other access policies; the proxy, however, learns nothing about the underlying plaintext. ...

متن کامل

Bounded Ciphertext Policy Attribute Based Encryption

In a ciphertext policy attribute based encryption system, a user’s private key is associated with a set of attributes (describing the user) and an encrypted ciphertext will specify an access policy over attributes. A user will be able to decrypt if and only if his attributes satisfy the ciphertext’s policy. In this work, we present the first construction of a ciphertext-policy attribute based e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Peer to Peer Networks

سال: 2010

ISSN: 2229-5240

DOI: 10.5121/ijp2p.2010.1101