A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
2016
KSII Transactions on Internet and Information Systems
In ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user's secret key is associated with a set of attributes, and the ciphertext is associated with an access policy. ...
the users do useless computation if the attributes don't match the hidden access policy. ...
[32] proposed a white-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. ...
doi:10.3837/tiis.2016.07.026
fatcat:ztcmphqyjfhwpmrdw2l53o4kym
Ciphertext policy Attribute based Encryption with anonymous access policy
2010
International Journal of Peer to Peer Networks
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt the encrypted message. The policy can be formed with the help of attributes. ...
The proposed construction is provably secure under Decision Bilinear Diffe-Hellman assumption. Setup: The setup algorithm takes no input other than the implicit security parameter. ...
Our Contribution We present a scheme for constructing a Ciphertext Policy Attribute based Encryption with hidden access policy and provide security under the Decisional Diffie-Hellman assumption. ...
doi:10.5121/ijp2p.2010.1101
fatcat:av32bkbe6zdzncm27foeoh2e24
Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
2019
KSII Transactions on Internet and Information Systems
Ciphertext-policy attribute-based encryption (CP-ABE) is one of the practical technologies to share data over cloud since it can protect data confidentiality and support fine-grained access control on ...
Unfortunately, in this paper, we show that their scheme fails to achieve hidden access policy at first. ...
Generally speaking, the ABE schemes can be divided into two types: key-policy attribute-based encryption and ciphertext-policy attribute-based encryption, abbreviated as CP-ABE and KP-ABE respectively. ...
doi:10.3837/tiis.2019.05.029
fatcat:lbnwubxvfzaupnulqqxysnf7uq
Ciphertext Policy Attribute based Encryption with anonymous access policy
[article]
2010
arXiv
pre-print
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt the encrypted message. The policy can be formed with the help of attributes. ...
The proposed construction is provably secure under Decision Bilinear Diffe-Hellman assumption. ...
Our Contribution We present a scheme for constructing a Ciphertext Policy Attribute based Encryption with hidden access policy and provide security under the Decisional Diffie-Hellman assumption. ...
arXiv:1011.0527v1
fatcat:onqdw2vngnfs5inlciy3nc2gxe
Offline/Online Outsourced Attribute-Based Encryption with Partial Policy Hidden for the Internet of Things
2020
Journal of Sensors
To mitigate these issues, an offline/online attribute-based encryption scheme that supports partial policy hidden and outsourcing decryption will be proposed. ...
Meanwhile, in order to solve the problem of policy disclosure under the cloud platform, the policy hidden is supported, that is, the attribute is divided into the attribute value and the attribute name ...
[24] proposed an offline/online attribute-based encryption scheme that achieved full security under the standard model. ...
doi:10.1155/2020/8861114
fatcat:eqjwnfxrorhgtix5a7ywdw2vne
Towards a cryptography encyclopedia: a survey on attribute-based encryption
2023
Journal of Surveillance, Security and Safety
In this survey, we create a sub-encyclopedia for attribute-based encryption (ABE) schemes. ...
The diverse use of encryption schemes has led to the development of schemes with a variety of properties. ...
It had ciphertexts of constant size and used a threshold-based access policy. The security analysis in standard models showed resistance to selective adversaries under q-type assumptions. Li et al. ...
doi:10.20517/jsss.2023.30
fatcat:sreleuvsivbznkt72sypgthym4
A Review on Access Control Policy and Key Generation in Data Sharing
2019
International Journal of Advanced Engineering Research and Science
Hence, both ciphertext storage and time cost of encryption are saved. Additionally, the proposed scheme is proved to be secure under the standard assumption. ...
It consist four different attribute based encryption schemes such as KP-ABE (Key-policy attribute-based encryption), CP-ABE (ciphertext-policy attribute-based encryption), HABE (Hierarchical Attribute ...
doi:10.22161/ijaers.6.2.6
fatcat:jghs5et6lbhxxjgd7e2c2d2cve
An encrypted cloud email searching and filtering scheme based on hidden policy ciphertext-policy attribute-based encryption with keyword search
2021
IEEE Access
INDEX TERMS attribute-based keyword search; Dual System Encryption; encrypted email filtering; hidden policy. ...
We propose an encrypted cloud email searching and filtering scheme based on hidden policy ciphertextpolicy attribute-based encryption with keyword search as a new solution. ...
According to this direction of thinking, we become the first to propose a hidden policy ciphertext-policy attribute-based encryption with keyword search (HPCPABKS) scheme to solve the problem of encrypted ...
doi:10.1109/access.2021.3136331
fatcat:lpqmzhm5ovh2zfgqtyqmmwokuq
Anonymous attribute-based encryption supporting efficient decryption test
2013
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security - ASIA CCS '13
This technique works by computing special components in ciphertexts, which are used to perform the test that if the attribute private key matches the hidden attributes policy in ciphertexts without decryption ...
Attribute-based encryption (ABE) has been widely studied recently to support fine-grained access control of shared data. ...
Especially, ciphertext-policy attribute-based encryption (CP-ABE) [1] puts access policy decisions in the hands of data owners. ...
doi:10.1145/2484313.2484381
dblp:conf/ccs/ZhangCLWL13
fatcat:4alxqaddcjeahodjhhzg2ar4zm
Efficient Attribute-Based Secure Data Sharing with Hidden Policies and Traceability in Mobile Health Networks
2016
Mobile Information Systems
The proposed scheme guarantees a hidden policy, constant-sized ciphertexts, and traces, with security analyses. ...
In this paper, we propose an efficient attribute-based secure data sharing scheme in mHealth. ...
An encryptor defines the access policy with a set of attributes, encrypts the EHRs associated with clinical reports under the policy, and uploads the ciphertext and the obfuscated policy to the storage ...
doi:10.1155/2016/6545873
fatcat:x64vnqiwo5fq5m7xbkxwjhpimu
Hierarchical policy delegation in multiple-authority ABE
2015
International Journal of Information and Computer Security
Current methods require encryptors to build ciphertext access policies themselves, using attributes published by authority domains. ...
We present HM-ABE, a hierarchical multi-authority attributebased encryption scheme with policy delegation, that generalizes current work significantly. ...
Conclusion We have presented HM-ABE, a new hierarchical distributed attribute-based encryption scheme, which permits policy delegation. Recursive policy delegation is supported. ...
doi:10.1504/ijics.2015.073020
fatcat:3intctu4jzhyhbctigrzxnq4ki
Efficient privacy-preserving access control of mobile multimedia data in cloud computing
2019
IEEE Access
With the nature of allowing the encryptor to define the access policy before encrypting a message, Ciphertext-policy attribute-based encryption (CP-ABE) has been widely adopted as a primitive to design ...
INDEX TERMS Mobile multimedia data, access control, CP-ABE, partially hidden policy, online/offline encryption, efficient decryption. ...
In the CP-ABE ciphertext, the concrete attribute values of the specific access policy are embedded and hidden. ...
doi:10.1109/access.2019.2939299
fatcat:7lvsr2gg3rha7grkoy2s6ma2oi
Expressive CP-ABE with partially hidden access structures
2012
Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security - ASIACCS '12
In a traditional ciphertext-policy attribute-based encryption (CP-ABE) scheme, an access structure, also refereed to as ciphertext-policy, is sent along with a ciphertext explicitly, and anyone who obtains ...
One can construct CP-ABE with hidden access structures from attribute-hiding Inner-product Predicate Encryption (IPE) [12] . ...
Attribute-Based Encryption (ABE). ...
doi:10.1145/2414456.2414465
dblp:conf/ccs/LaiDL12
fatcat:6gokhotpcjabpcr3fz4fd22pja
A Survey of Research Progress and Development Tendency of Attribute-Based Encryption
2014
The Scientific World Journal
With the development of cryptography, the attribute-based encryption (ABE) draws widespread attention of the researchers in recent years. ...
The ABE scheme, which belongs to the public key encryption mechanism, takes attributes as public key and associates them with the ciphertext or the user's secret key. ...
Acknowledgment This work is supported by the National Natural Science Foundation of China under Grant nos. 61103178, 61103199, and 60803151, and the Basic Science Research Fund in Xidian University. ...
doi:10.1155/2014/193426
pmid:25101313
pmcid:PMC4101931
fatcat:gj2byf7xozaadhx4ppfcblgany
M.Tech Thesis.pdf
2021
figshare.com
In this paper, we propose a New Hidden Policy Ciphertext Policy Attribute Based Encryption (HP-CP-ABE) to ensure Big Data Access Control with Privacy-preserving Policy in Cloud. ...
We also applied mask technique on each attribute in access policy and embed the access policy in ciphertext, to protect user's private information from access policy. ...
This paper proposed two models, 1st proposed a CP-ABE hidden policy model that is used tree-based access structure and also has a CPA attack under DBDH assumption. ...
doi:10.6084/m9.figshare.14541912.v1
fatcat:hmwhmid6l5a57gyjloeityltdu
« Previous
Showing results 1 — 15 out of 1,125 results