Key-Policy Weighted Attribute based Encryption for fine-grained access control

作者: Ximeng Liu , Hui Zhu , Jianfeng Ma , Jun Ma , Siqi Ma

DOI: 10.1109/ICCW.2014.6881280

关键词: Probabilistic encryptionInformation securityAttribute-based encryptionTheoretical computer scienceMultiple encryptionAccess control56-bit encryption40-bit encryptionComputer scienceEncryption

摘要: … encryption method cannot catch up with. Recently, a new encryption primitive called Attribute Based Encryption(… both information security and fine-grained access control. Although the …

参考文章(15)
Javier Herranz, Fabien Laguillaumie, Carla Ràfols, Constant size ciphertexts in threshold attribute-based encryption public key cryptography. ,vol. 6056, pp. 19- 34 ,(2010) , 10.1007/978-3-642-13013-7_2
Amit Sahai, Brent Waters, Fuzzy identity-based encryption theory and application of cryptographic techniques. ,vol. 3494, pp. 457- 473 ,(2005) , 10.1007/11426639_27
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5
Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi, A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length Information Security Practice and Experience. pp. 13- 23 ,(2009) , 10.1007/978-3-642-00843-6_2
Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Jun Ma, Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control intelligent networking and collaborative systems. pp. 51- 57 ,(2013) , 10.1109/INCOS.2013.18
Jin Li, Qian Wang, Cong Wang, Kui Ren, Enhancing Attribute-Based Encryption with Attribute Hierarchy Mobile Networks and Applications. ,vol. 16, pp. 553- 561 ,(2011) , 10.1007/S11036-010-0233-Y
Ran Canetti, Shai Halevi, Jonathan Katz, Chosen-Ciphertext Security from Identity-Based Encryption theory and application of cryptographic techniques. pp. 207- 222 ,(2004) , 10.1007/978-3-540-24676-3_13
Ling Cheung, Calvin Newport, Provably secure ciphertext policy ABE computer and communications security. pp. 456- 465 ,(2007) , 10.1145/1315245.1315302
John Bethencourt, Amit Sahai, Brent Waters, Ciphertext-Policy Attribute-Based Encryption ieee symposium on security and privacy. pp. 321- 334 ,(2007) , 10.1109/SP.2007.11