Hierarchical attribute-based encryption and decryption

作者: Tanya Ignatenko , Milan Petkovic , Muhammad Asim

DOI:

关键词:

摘要: A domain authority 13 for use in a hierarchy of authorities hierarchical cryptographic system. The comprises user secret key generator 21 generating based on and one or more attribute representations, to obtain associated with set attributes corresponding the wherein is parent root authorities, representations are independent hierarchy.A decrypter makes key. An encrypter generates ciphertext decryptable by decrypter.

参考文章(20)
Jun’e Liu, Zhiguo Wan, Ming Gu, Hierarchical attribute-set based encryption for scalable, flexible and fine-grained access control in cloud computing information security practice and experience. pp. 98- 107 ,(2011) , 10.1007/978-3-642-21031-0_8
Zachary N.J. Peterson, Joseph A. Akinyele, Matthew W. Pagano, Aviel D. Rubin, Christoph U. Lehmann, Matthew D. Green, Self-Protecting Electronic Medical Records Using Attribute-Based Encryption IACR Cryptology ePrint Archive. ,vol. 2010, pp. 565- ,(2010)
Melissa Chase, Multi-authority Attribute Based Encryption Theory of Cryptography. pp. 515- 534 ,(2007) , 10.1007/978-3-540-70936-7_28
Butler W. Lampson, Andrew C. Goldstein, Martin Abadi, Compound principals in access control lists ,(1990)
Michael James Wiener, Warwick Stanley Ford, Computer Network Cryptographic Key Distribution System ,(1995)
Guojun Wang, Qin Liu, Jie Wu, Hierarchical attribute-based encryption for fine-grained access control in cloud storage services computer and communications security. pp. 735- 737 ,(2010) , 10.1145/1866307.1866414