Oriented User Group Verifiable Attribute-Based Encryption Scheme

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Verifiable Attribute Based Encryption

In this paper, we propose the notion of Verifiable Attribute-Based Encryption (VABE) and give two constructs of key-policy VABE. One is with a single authority, and the other is with multi authorities. Not only our schemes are proved secure as the previous ABE schemes, they also provide a verification property. This could not be trivially solved, such as trying random decryption. Adding the ver...

متن کامل

Concrete Attribute-Based Encryption Scheme with Verifiable Outsourced Decryption

As more sensitive data is shared and stored by third-party sites on the internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data is that it can be selectively shared only at a coarse-grained level. Attribute based encryption is a public-key-based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promisin...

متن کامل

Verifiable multi-authority attribute based encryption scheme with different permissions

In this paper, we study the traffic information granular computing theory and build traffic information fusion model, framework and implementation program based on granular computing. We raise uncertainty reduction algorithms for traffic flow prediction and congestion recognition algorithms based on granular computing theory, which will provide new ideas and methods in the complex decision maki...

متن کامل

Attribute Based Encryption Schemes for Efficient Verifiable Data Sharing

Attribute-based encryption (ABE) with outsourced decryption not only enables finegrained sharing of encrypted data, but also overcomes the effective drawback of the standard ABE schemes. An Attribute based encryption scheme with outsourced decryption allows a third party (e.g., a cloud server) to renovate an ABE cipher text into a (short) El Gamal-type cipher text using a public transformation ...

متن کامل

Using Ciphertext Policy Attribute Based Encryption for Verifiable Secret Sharing

Threshold secret sharing schemes are used to divide a given secret by a dealer in parts such that no less than the threshold number of shareholders can reconstruct the secret. However, these schemes are susceptible to the malicious behavior of a shareholder or a dealer. To prevent such attacks, it is necessary to make a provision for verification of the integrity of the shares distributed by th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Security and Its Applications

سال: 2016

ISSN: 1738-9976,1738-9976

DOI: 10.14257/ijsia.2016.10.1.36