Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption

作者: S. Lin , R. Zhang , H. Ma , M. Wang

DOI: 10.1109/TIFS.2015.2449264

关键词: Deterministic encryptionTheoretical computer scienceFilesystem-level encryptionPlaintext-aware encryptionCommitment schemeAttribute-based encryptionMultiple encryptionOn-the-fly encryption56-bit encryptionVerifiable secret sharingCiphertextProbabilistic encryptionKey encapsulationComputer scienceLink encryptionSymmetric-key algorithmClient-side encryptionEncryptionComputer securityPlaintext40-bit encryption

摘要: … a parallel encryption technique, while one of the encryption … construction of ABE with verifiable outsourced decryption (VO… -KEM), a symmetric-key encryption scheme and a commitment …

参考文章(29)
Susan Hohenberger, Brent Waters, Attribute-Based Encryption with Fast Decryption Public-Key Cryptography – PKC 2013. pp. 162- 179 ,(2013) , 10.1007/978-3-642-36362-7_11
Brent Waters, Susan Hohenberger, Matthew Green, Outsourcing the decryption of ABE ciphertexts usenix security symposium. pp. 34- 34 ,(2011)
Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou, Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption european symposium on research in computer security. pp. 592- 609 ,(2013) , 10.1007/978-3-642-40203-6_33
Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters, Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption theory and application of cryptographic techniques. pp. 62- 91 ,(2010) , 10.1007/978-3-642-13190-5_4
Amit Sahai, Brent Waters, Fuzzy identity-based encryption theory and application of cryptographic techniques. ,vol. 3494, pp. 457- 473 ,(2005) , 10.1007/11426639_27
Moon Sung Lee, Bo Gyeong Kang, Je Hong Park, Efficient Delegation of Pairing Computation. IACR Cryptology ePrint Archive. ,vol. 2005, pp. 259- ,(2005)
Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, Amit Sahai, Exposure-resilient functions and all-or-nothing transforms theory and application of cryptographic techniques. pp. 453- 469 ,(2000) , 10.1007/3-540-45539-6_33
Rosario Gennaro, Craig Gentry, Bryan Parno, Non-interactive verifiable computing: outsourcing computation to untrusted workers international cryptology conference. ,vol. 2009, pp. 465- 482 ,(2010) , 10.1007/978-3-642-14623-7_25