A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
[chapter]
2011
Lecture Notes in Computer Science
This paper proposes the first key-policy attribute-based encryption (KP-ABE) schemes allowing for non-monotonic access structures (i.e., that may contain negated attributes) and with constant ciphertext ...
KP-ABE realization with constant-size ciphertexts. ...
In the context of key-policy attribute-based encryption, this paper aims at devising schemes with constant-size ciphertexts 5 (regardless of the number of ciphertext attributes) allowing for as expressive ...
doi:10.1007/978-3-642-19379-8_6
fatcat:mrkchng2mvcunla4gz6kriesli
Computationally Efficient Expressive Key-Policy Attribute Based Encryption Schemes with Constant-Size Ciphertext
[chapter]
2013
Lecture Notes in Computer Science
In this paper, we present two attribute based encryption (ABE) schemes for monotone access structure (MAS) in the key-policy setting, where secret key is generated according to a MAS, ciphertext is associated ...
Based Encryption (ABE) [1,2,3] if one of the parameters for ciphertext and secret key is a tuple of attributes, and the other is an access structure or monotone span program over a set of attributes, wherein ...
[8] is a major step forward in designing expressive KP-ABE schemes with constant-size ciphertexts.
Background Notation. ...
doi:10.1007/978-3-319-02726-5_25
fatcat:t4zfcmvuqba57ijec7gkw4zwsa
CONCEPTUAL FRAMEWORK FOR LIGHTWEIGHT CIPHERTEXT POLICY-ATTRIBUTE BASED ENCRYPTION SCHEME FOR INTERNET OF THINGS DEVICES
2019
MALAYSIAN JOURNAL OF COMPUTING
Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices. ...
Cryptography with lightweight features is one of the focus area by researchers to develop a powerful cryptography scheme for IoT devices. ...
Schemes with constant size ciphertexts (Zhang et al., 2014) , (Emura et al., 2009) , (Herranz et al., 2010) and constant size secret keys (Emura et al., 2009) , (Guo et al., 2014) with an expressive ...
doi:10.24191/mjoc.v4i1.6107
fatcat:hovykfn7tjghpd44xdhf5jqwui
An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
2013
Mathematical Problems in Engineering
Key-policy attribute-based encryption (KP-ABE) is an important type of ABE, which enables senders to encrypt messages under a set of attributes and private keys are associated with access structures that ...
In this paper, we propose a new KP-ABE construction with constant ciphertext size. In our construction, the access policy can be expressed as any monotone access structure. ...
Acknowledgments This research is jointly funded by the National Natural Science Foundation of China (Grant no. 61173189) and the Guangdong Province Information Security Key Laboratory Project. ...
doi:10.1155/2013/810969
fatcat:jp2467xlrfh3lkxxte2ktjxxfi
Improving Security in Multi Authority Attribute Based Encryption with Fast Decryption
2016
Procedia Computer Science
Attribute Based Encryption (ABE) is a type of public encryption in decryptor can only decrypt the ciphertext if its attributes of secret key matches the attributes of ciphertext but functionality comes ...
In this paper, a secure multi authority attribute based encryption with fast decryption scheme is design. ...
[3] propose a new scheme for chosen ciphertext secure ciphertext policy attribute based encryption scheme with constant size ciphertext and t of n threshold policy. ...
doi:10.1016/j.procs.2016.03.080
fatcat:4xe2wa3c2zd7dpb443lppeqjva
A Novel Constant size Cipher-text Scheme for Security in Real-time Systems
2015
International Journal of Computer Applications Technology and Research
However, current 'secure attribute based system with short ciphertext' schemes suffer from the issue of having long decryption keys, in which the size is linear to and dependent on the number of attributes.Ciphertext-Policy ...
We propose a novel 'secure attribute based system with short ciphertext' scheme with constantsize decryption keys independent of the number of attributes. ...
Based on the key only, attributes are encrypted and provide the cipher text values. Encryption is done independent on number of attributes with constant size decryption keys. ...
doi:10.7753/ijcatr0405.1002
fatcat:ue6ixv7kuvhxnhfqij6zi7aywy
Analysis of attribute-based cryptographic techniques and their application to protect cloud services
2019
Transactions on Emerging Telecommunications Technologies
Attribute based cryptography is commonly used to provide encrypted and/or authenticated access to outsourced data in remote servers. ...
In addition, we explore the limitations of existing attribute based cryptographic mechanisms and propose future research directions to better fit the growing needs of this cloud environment in terms of ...
Waters et al. presented a SA-CP-ABE scheme with short ciphertext that uses an expressive access policy 27 . The ciphertext size increases linearly with the access structure's size. ...
doi:10.1002/ett.3667
fatcat:eu7rs5halbefrmbiipbf6t7c7e
On efficient ciphertext-policy attribute based encryption and broadcast encryption
2010
Proceedings of the 17th ACM conference on Computer and communications security - CCS '10
Ciphertext Policy Attribute Based Encryption (CP-ABE) enforces an expressive data access policy, which consists of a number of attributes connected by logical gates. ...
In this paper, we proposed a new construction of CP-ABE, named Constant-size CP-ABE (denoted as CCP-ABE) that significantly reduces the ciphertext to a constant size for an AND gate access policy with ...
In this paper, we propose a novel CP-ABE construction, named Constant-size Ciphertext Policy Attribute Based Encryption (CCP-ABE), which incurs constant-size of ciphertext, regardless of the number of ...
doi:10.1145/1866307.1866420
dblp:conf/ccs/ZhouH10
fatcat:wrjs6jlrjjcipfv323cc26xmdi
Constant Ciphertext Length in CP-ABE
[article]
2012
arXiv
pre-print
Ciphertext policy attribute based encryption (CP-ABE) is a technique in which user with secret key containing attributes, only able to decrypt the message if the attributes in the policy match with the ...
The existing methods that use reasonably computable decryption policies produce the ciphertext of size at least linearly varying with the number of attributes with additional pairing operations during ...
Key Policy Attribute Based Encryption (KP-ABE) and Ciphertext Policy Attribute Based Encryption (CP-ABE). ...
arXiv:1208.5991v2
fatcat:d2cvhg5krnb7jomuiaz4qfyune
Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT
2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications
Third, ciphertexts received by the end-user are constant sized and independent from the number of attributes used in the access policy which affords low communication and storage costs. ...
In this paper, we design PU-ABE, a new variant of key policy attribute based encryption supporting efficient access policy update that captures attributes addition and revocation to access policies. ...
Several expressive Key policy attribute based encryption schemes with constant ciphertext size have been designed (Attrapadung et al., 2012; Wang and Luo, 2012; Emura et al., 2009 ). Wang et al. ...
doi:10.5220/0006854603010312
dblp:conf/icete/BelguithKR18
fatcat:fxzcf6r55zcl3prcdljwbudqqe
Categorical Heuristic for Attribute Based Encryption in the Cloud Server
English
2014
International Journal of Computer Trends and Technology
English
Attribute-based encryption (ABE) is a public-key based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. ...
A promising application of ABE is flexible access control of encrypted data stored in the cloud, using access polices and ascribed attributes associated with private keys and Ciphertexts. ...
Attribute-Based Encryption schemes with constant-size ciphertexts ABE as introduced Sahai and Waters, allows for fine-grained access control on encrypted data. ...
doi:10.14445/22312803/ijctt-v9p115
fatcat:ymn4kycumbdl7eh4jpcf7qdgly
Constant Size Ciphertexts in Threshold Attribute-Based Encryption
[chapter]
2010
Lecture Notes in Computer Science
All current attribute-based encryption schemes that admit reasonably expressive decryption policies produce ciphertexts whose size depends at least linearly on the number of attributes involved in the ...
In a ciphertextpolicy attribute-based encryption scheme, the secret keys of the users depend on their attributes. ...
Conclusion We have proposed in this paper the first (reasonably expressive) attribute-based encryption scheme with constant size ciphertexts. ...
doi:10.1007/978-3-642-13013-7_2
fatcat:5q2zjpqd5zcgjmse7whc52ufey
CUPS: Secure opportunistic cloud of things framework based on attribute‐based encryption scheme supporting access policy update
2019
Security and Privacy
Moreover, CUPS provides the access policy update feature with neither involving a proxy-server, nor re-encrypting the enciphered data contents and re-distributing the users' secret keys. ...
Attribute Based Encryption is a promising cryptographic mechanism suitable for distributed environments, providing flexible access control to encrypted data contents. ...
Several expressive KP-ABE schemes with constant ciphertext size have been designed 38, 39, 43 . Wang et al. 39 have proposed a KP-ABE scheme with constant ciphertext size. ...
doi:10.1002/spy2.85
fatcat:vzew5iosffekpcduhdkeexb64u
CP-ABE With Constant-Size Keys for Lightweight Devices
2014
IEEE Transactions on Information Forensics and Security
Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic tool where the encryptor can decide the access structure that will be used to protect the sensitive data. ...
We propose a novel CP-ABE scheme with constant-size decryption keys independent of the number of attributes. We found that the size can be as small as 672 bits. ...
The comparison shows that our scheme is the only expressive CP-ABE with constant-size decryption keys. ...
doi:10.1109/tifs.2014.2309858
fatcat:526nlts7ibbazixvknx4onbllm
Optimized Ciphertext-Policy Attribute-Based Encryption with Efficient Revocation
2013
International Journal of Security and Its Applications
In this work, we design a method for efficient revocation within Ciphertext-Policy Attribute-Based Encryption scheme. ...
The efficiency is also optimized that the size of user's private key has only a constant increase. ...
Efficiency Comparison Our scheme
Conclusion In this work, we design a method for efficient revocation within Ciphertext-Policy Attribute-Based Encryption scheme. ...
doi:10.14257/ijsia.2013.7.6.38
fatcat:mol5j52gqbc5vgrl2nxkjhnaui
« Previous
Showing results 1 — 15 out of 1,201 results