Ciphertext-policy attribute-based encryption with key-delegation abuse resistance
From MaRDI portal
Publication:2817487
DOI10.1007/978-3-319-40253-6_29zbMATH Open1405.94070OpenAlexW2501490596MaRDI QIDQ2817487FDOQ2817487
Authors: Yinhao Jiang, Willy Susilo, Yi Mu, Fuchun Guo
Publication date: 31 August 2016
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://ro.uow.edu.au/eispapers/5738
Recommendations
- Accountable large-universe attribute-based encryption supporting any monotone access structures
- Key-policy ABE with switchable attributes
- Defending against key abuse attacks in KP-ABE enabled broadcast systems
- Large universe ciphertext-policy attribute-based encryption with white-box traceability
- Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation
Cites Work
- Identity-based cryptosystems and signature schemes
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Title not available (Why is that?)
- Fuzzy Identity-Based Encryption
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
- Bounded Ciphertext Policy Attribute Based Encryption
- Predicate encryption supporting disjunctions, polynomial equations, and inner products
Cited In (12)
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
- Key-policy ABE with switchable attributes
- Practical ciphertext-policy attribute-based encryption: traitor tracing, revocation, and large universe
- Attribute-based encryption without key cloning
- Large universe ciphertext-policy attribute-based encryption with white-box traceability
- Accountable large-universe attribute-based encryption supporting any monotone access structures
- Key regeneration-free ciphertext-policy attribute-based encryption and its application
- PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption
- Defending against key abuse attacks in KP-ABE enabled broadcast systems
- User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
- Ciphertext-delegatable CP-ABE for a dynamic credential: a modular approach
- Adaptable Ciphertext-Policy Attribute-Based Encryption
This page was built for publication: Ciphertext-policy attribute-based encryption with key-delegation abuse resistance
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2817487)