CCA-secure ABE with outsourced decryption for fog computing

作者: Cong Zuo , Jun Shao , Guiyi Wei , Mande Xie , Min Ji

DOI: 10.1016/J.FUTURE.2016.10.028

关键词:

摘要: … i ) , where dk is a decryption key corresponding to I k , and it would be a private key d if the input ciphertext C i is an original ciphertext, or rk corresponding to I k and index i if C i is a …

参考文章(32)
Tatsuaki Okamoto, Katsuyuki Takashima, Fully Secure Unbounded Inner-Product and Attribute-Based Encryption Advances in Cryptology – ASIACRYPT 2012. pp. 349- 366 ,(2012) , 10.1007/978-3-642-34961-4_22
Brent Waters, Susan Hohenberger, Matthew Green, Outsourcing the decryption of ABE ciphertexts usenix security symposium. pp. 34- 34 ,(2011)
Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters, Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption theory and application of cryptographic techniques. pp. 62- 91 ,(2010) , 10.1007/978-3-642-13190-5_4
Amit Sahai, Brent Waters, Fuzzy identity-based encryption theory and application of cryptographic techniques. ,vol. 3494, pp. 457- 473 ,(2005) , 10.1007/11426639_27
S. Lin, R. Zhang, H. Ma, M. Wang, Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption IEEE Transactions on Information Forensics and Security. ,vol. 10, pp. 2119- 2130 ,(2015) , 10.1109/TIFS.2015.2449264
Matt Blaze, Gerrit Bleumer, Martin Strauss, Divertible protocols and atomic proxy cryptography theory and application of cryptographic techniques. ,vol. 1403, pp. 127- 144 ,(1998) , 10.1007/BFB0054122
Eiichiro Fujisaki, Tatsuaki Okamoto, Secure Integration of Asymmetric and Symmetric Encryption Schemes international cryptology conference. pp. 537- 554 ,(1999) , 10.1007/3-540-48405-1_34
Junzuo Lai, Robert H Deng, Chaowen Guan, Jian Weng, None, Attribute-Based Encryption With Verifiable Outsourced Decryption IEEE Transactions on Information Forensics and Security. ,vol. 8, pp. 1343- 1354 ,(2013) , 10.1109/TIFS.2013.2271848