3,082 Hits in 4.0 sec

Attribute-based encryption schemes with constant-size ciphertexts

Nuttapong Attrapadung, Javier Herranz, Fabien Laguillaumie, Benoît Libert, Elie de Panafieu, Carla Ràfols
2012 Theoretical Computer Science  
This paper proposes the first attribute-based encryption (ABE) schemes allowing for truly expressive access structures and with constant ciphertext size.  ...  rise to the most expressive KP-ABE realization with constant-size ciphertexts.  ...  Ciphertext-policy attribute-based encryption In a ciphertext-policy attribute-based encryption scheme, ciphertexts are associated with access structures over the subsets of at most n attributes of the  ... 
doi:10.1016/j.tcs.2011.12.004 fatcat:kcwz25emqndzvmxnupqkdbe76y

Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext [chapter]

Y. Sreenivasa Rao, Ratna Dutta
2013 Lecture Notes in Computer Science  
In this paper, we present two attribute based encryption (ABE) schemes for monotone access structure (MAS) in the key-policy setting, where secret key is generated according to a MAS, ciphertext is associated  ...  The most interesting features of both schemes are constant-size ciphertext, constant number of bilinear pairing evaluations and low computation cost (in terms of exponentiations) compared with previous  ...  [8] is a major step forward in designing expressive KP-ABE schemes with constant-size ciphertexts. Background Notation.  ... 
doi:10.1007/978-3-319-02726-5_25 fatcat:t4zfcmvuqba57ijec7gkw4zwsa


Nurhidayah Muhammad, Jasni Mohamad Zain
Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices.  ...  Cryptography with lightweight features is one of the focus area by researchers to develop a powerful cryptography scheme for IoT devices.  ...  Ciphertext policy-Attribute based encryption schemes faced with bulky ciphertext problem, it's because In CP-ABE, ciphertext is associated with an access policy, so the more boolean of access policy, the  ... 
doi:10.24191/mjoc.v4i1.6107 fatcat:hovykfn7tjghpd44xdhf5jqwui

Improving Security in Multi Authority Attribute Based Encryption with Fast Decryption

Nikita Gorasia, R.R. Srikanth, Nishant Doshi, Jay Rupareliya
2016 Procedia Computer Science  
In this paper, a secure multi authority attribute based encryption with fast decryption scheme is design.  ...  Attribute Based Encryption (ABE) is a type of public encryption in decryptor can only decrypt the ciphertext if its attributes of secret key matches the attributes of ciphertext but functionality comes  ...  [3] propose a new scheme for chosen ciphertext secure ciphertext policy attribute based encryption scheme with constant size ciphertext and t of n threshold policy.  ... 
doi:10.1016/j.procs.2016.03.080 fatcat:4xe2wa3c2zd7dpb443lppeqjva

An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length

Changji Wang, Jianfa Luo
2013 Mathematical Problems in Engineering  
In most existing KP-ABE scheme, the ciphertext size grows linearly with the number of attributes embedded in ciphertext.  ...  Key-policy attribute-based encryption (KP-ABE) is an important type of ABE, which enables senders to encrypt messages under a set of attributes and private keys are associated with access structures that  ...  Thus, this transformation provides us with monotonic KP-ABE schemes with constant-size ciphertexts by using identity-based broadcast encryption schemes with linearity property and constant ciphertext size  ... 
doi:10.1155/2013/810969 fatcat:jp2467xlrfh3lkxxte2ktjxxfi

Cryptographic Algorithms for Efficient and Secure Data Sharing in Cloud Storage
IJARCCE - Computer and Communication Engineering

Shweta. P. Tenginkai, Vani K. S
2015 IJARCCE  
With the introduction of encryption and decryption schemes, the storing, sharing and securing of data became rampant.  ...  In this paper, we explore the various encryption schemes which were proposed to solve this problem.  ...  Attribute Based Encryption Schemes Attributes play a very critical role in Attribute-based Encryption (ABE) scheme.  ... 
doi:10.17148/ijarcce.2015.4260 fatcat:tap54egks5ezdjenaw55vctt3q

Current Issues in Ciphertext Policy-Attribute Based Scheme for Cloud Computing: A Survey

Norhidayah Muhammad, Jasni Mohamad Zain, Mumtazimah Mohamad
2018 International Journal of Engineering & Technology  
ABE contains two types, namely, Ciphertext Policy-Attribute Based Encryption (CP-ABE) and Key Policy- Attribute based Encryption (KP-ABE).  ...  One of the common encryption methods in cloud security is Attribute Based Encryption (ABE).  ...  Zhou [10] has proposed an algorithm named Privacy Preserving Constant-size Ciphertext Policy Attribute Based Encryption (PP-CP-ABE), which enforces access policies with wildcards and incurs constant-size  ... 
doi:10.14419/ijet.v7i2.15.11215 fatcat:2z6ps7qzureffpzgwydyjzehei

A Novel Constant size Cipher-text Scheme for Security in Real-time Systems

M. Dhivya, S. Venkatraman, Tina Belinda Miranda
2015 International Journal of Computer Applications Technology and Research  
We propose a novel 'secure attribute based system with short ciphertext' scheme with constantsize decryption keys independent of the number of attributes.  ...  However, current 'secure attribute based system with short ciphertext' schemes suffer from the issue of having long decryption keys, in which the size is linear to and dependent on the number of attributes.Ciphertext-Policy  ...  Based on the key only, attributes are encrypted and provide the cipher text values. Encryption is done independent on number of attributes with constant size decryption keys.  ... 
doi:10.7753/ijcatr0405.1002 fatcat:ue6ixv7kuvhxnhfqij6zi7aywy

CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud

2020 KSII Transactions on Internet and Information Systems  
This proposed scheme focuses on the revocation of the attributes of the withdrawn users and the output of a ciphertext of a constant-size, and improves the efficiency of the user decryption operation through  ...  In addition, the existing CP-ABE scheme increases the size of the ciphertext according to the number of attributes specified by the data owner.  ...  This is an attribute-based secure data sharing scheme that supports ciphertexts of constanted size and the outsourcing of decryption operations.  ... 
doi:10.3837/tiis.2020.10.012 fatcat:t4pq2u6nzjhgzlrgpuscbvmgbi

A Study on CP-ABE-based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment

Yong-Woon Hwang, Im-Yeong Lee
2020 Sensors  
Second, Attribute-Based Encryption (ABE) increases the size of the ciphertext depending on the number of attributes specified.  ...  Many studies have been conducted on access control techniques using ciphertext-policy attribute-based encryption (CP-ABE), a form of attribute-based encryption, among various security technologies and  ...  In 2017, the Helil scheme [15] proposed a hierarchical attribute-based access control method using a constant size ciphertext, but the size of the ciphertext is proportional to the number of attributes  ... 
doi:10.3390/s20174934 pmid:32878202 pmcid:PMC7506716 fatcat:zuqhdxs2eveepntqo7h6gojeea

Analysis of attribute-based cryptographic techniques and their application to protect cloud services

Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh
2019 Transactions on Emerging Telecommunications Technologies  
Attribute based cryptography is commonly used to provide encrypted and/or authenticated access to outsourced data in remote servers.  ...  schemes, w.r.t. supported features, namely security, privacy and functional requirements.  ...  To countermeasure this drawback, Rao et al. 101 proposed the first KP-ABSC scheme with constant ciphertext size. The first CP-ABSC scheme with constant ciphertext size was proposed in 2017 102 .  ... 
doi:10.1002/ett.3667 fatcat:eu7rs5halbefrmbiipbf6t7c7e

Constant Ciphertext Length in CP-ABE [article]

Nishant Doshi, Devesh Jinwala
2012 arXiv   pre-print
Ciphertext policy attribute based encryption (CP-ABE) is a technique in which user with secret key containing attributes, only able to decrypt the message if the attributes in the policy match with the  ...  In this paper, we propose a scheme in which ciphertext remains constant in length, irrespective of the number of attributes.  ...  Key Policy Attribute Based Encryption (KP-ABE) and Ciphertext Policy Attribute Based Encryption (CP-ABE).  ... 
arXiv:1208.5991v2 fatcat:d2cvhg5krnb7jomuiaz4qfyune

Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT

Sana Belguith, Nesrine Kaaniche, Giovanni Russello
2018 Proceedings of the 15th International Joint Conference on e-Business and Telecommunications  
Third, ciphertexts received by the end-user are constant sized and independent from the number of attributes used in the access policy which affords low communication and storage costs.  ...  To ensure both requirements, Attribute Based Encryption (ABE) has been widely applied to ensure encrypted access control to outsourced data.  ...  (Herranz et al., 2010) have proposed the first constant size threshold ciphertext-policy attribute based encryption scheme.  ... 
doi:10.5220/0006854603010312 dblp:conf/icete/BelguithKR18 fatcat:fxzcf6r55zcl3prcdljwbudqqe

On efficient ciphertext-policy attribute based encryption and broadcast encryption

Zhibin Zhou, Dijiang Huang
2010 Proceedings of the 17th ACM conference on Computer and communications security - CCS '10  
Each ciphertext in CCP-ABE requires only 2 elements on a bilinear group. Based on CCP-ABE, we further proposed an Attribute Based Broadcast Encryption (ABBE) scheme.  ...  However, all existing CP-ABE schemes incur very large ciphertext size, which increases linearly with respect to the number of attributes in the access policy.  ...  In this paper, we propose a novel CP-ABE construction, named Constant-size Ciphertext Policy Attribute Based Encryption (CCP-ABE), which incurs constant-size of ciphertext, regardless of the number of  ... 
doi:10.1145/1866307.1866420 dblp:conf/ccs/ZhouH10 fatcat:wrjs6jlrjjcipfv323cc26xmdi

A Survey on Ciphertext-Policy Attribute-based Encryption (CP-ABE) Approaches to Data Security on Mobile Devices and its Application to IoT

Steve Moffat, Mohammad Hammoudeh, Robert Hegarty
2017 Proceedings of the International Conference on Future Networks and Distributed Systems - ICFNDS '17  
Due to the sheer volume of research, the survey has focused on one aspect of ABE -Ciphertext-Policy Attribute-Based Encryption -in line with its prominence in ABE in MCC research to date.  ...  Innovative encryption schemes have been developed to address the challenges of data protection in the Cloud and having greater control over who should be accessing what data, one of which is Attribute-Based  ...  Suffice to say that based on the variables provided the scheme delivers constant-size ciphertexts and secret keys at sizes which are of lower order than other schemes (multiples of bilinear group or plaintext  ... 
doi:10.1145/3102304.3102338 dblp:conf/icfnds/MoffatHH17 fatcat:5jls5fu3nrdybnmwotrcpsn6ai
« Previous Showing results 1 — 15 out of 3,082 results