Attribute-Based Encryption With Verifiable Outsourced Decryption

作者: Junzuo Lai , Robert H Deng , Chaowen Guan , Jian Weng , None

DOI: 10.1109/TIFS.2013.2271848

关键词:

摘要: … In Section III, we describe our new model of CP-ABE with verifiable outsourced decryption. We present a new CP-ABE scheme with verifiable outsourced decryption and its security …

参考文章(35)
Benoît Chevallier-Mames, Jean-Sébastien Coron, Noel McCullagh, David Naccache, Michael Scott, Secure Delegation of Elliptic-Curve Pairing Lecture Notes in Computer Science. ,vol. 6035, pp. 24- 35 ,(2010) , 10.1007/978-3-642-12510-2_3
Ran Canetti, Oded Goldreich, Shai Halevi, The random oracle methodology, revisited (preliminary version) symposium on the theory of computing. pp. 209- 218 ,(1998) , 10.1145/276698.276741
Steven D. Galbraith, Kenneth G. Paterson, Nigel P. Smart, Pairings for cryptographers Discrete Applied Mathematics. ,vol. 156, pp. 3113- 3121 ,(2008) , 10.1016/J.DAM.2007.12.010
Craig Gentry, Fully homomorphic encryption using ideal lattices Proceedings of the 41st annual ACM symposium on Symposium on theory of computing - STOC '09. pp. 169- 178 ,(2009) , 10.1145/1536414.1536440
Nuttapong Attrapadung, Javier Herranz, Fabien Laguillaumie, Benoît Libert, Elie de Panafieu, Carla Ràfols, Attribute-based encryption schemes with constant-size ciphertexts Theoretical Computer Science. ,vol. 422, pp. 15- 38 ,(2012) , 10.1016/J.TCS.2011.12.004
Mihir Bellare, Phillip Rogaway, Random oracles are practical: a paradigm for designing efficient protocols computer and communications security. pp. 62- 73 ,(1993) , 10.1145/168588.168596
Rafail Ostrovsky, Amit Sahai, Brent Waters, Attribute-based encryption with non-monotonic access structures computer and communications security. ,vol. 2007, pp. 195- 203 ,(2007) , 10.1145/1315245.1315270
Ling Cheung, Calvin Newport, Provably secure ciphertext policy ABE computer and communications security. pp. 456- 465 ,(2007) , 10.1145/1315245.1315302
John Bethencourt, Amit Sahai, Brent Waters, Ciphertext-Policy Attribute-Based Encryption ieee symposium on security and privacy. pp. 321- 334 ,(2007) , 10.1109/SP.2007.11
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger, Improved proxy re-encryption schemes with applications to secure distributed storage ACM Transactions on Information and System Security. ,vol. 9, pp. 1- 30 ,(2006) , 10.1145/1127345.1127346