• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 405
Next 10 →

Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption

by Allison Lewko, Amit Sahai, Tatsuaki Okamoto, Katsuyuki Takashima, Brent Waters
"... In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of ABE were only proven to be selectively secure. We achieve full security by adapting the dual system encryption methodology r ..."
Abstract - Cited by 145 (21 self) - Add to MetaCart
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of ABE were only proven to be selectively secure. We achieve full security by adapting the dual system encryption methodology

Distributed Attribute-Based Encryption

by Sascha Müller, Stefan Katzenbeisser, Claudia Eckert - in International Conference on Information Security and Cryptology (ICISC’08 , 2008
"... allows to encrypt data under an access policy, specified as a logical combination of attributes. Such ciphertexts can be decrypted by anyone with a set of attributes that fits the policy. In this paper, we introduce the concept of Distributed Attribute-Based Encryption (DABE), where an arbitrary num ..."
Abstract - Cited by 16 (2 self) - Add to MetaCart
allows to encrypt data under an access policy, specified as a logical combination of attributes. Such ciphertexts can be decrypted by anyone with a set of attributes that fits the policy. In this paper, we introduce the concept of Distributed Attribute-Based Encryption (DABE), where an arbitrary

Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption

by Muhammad Asim, Tanya Ignatenko, Milan Petkovic, Daniel Trivellato
"... Virtual organizations are dynamic, inter-organizational collaborations that involve systems and services belonging to different security domains. Several solutions have been proposed to guarantee the enforce-ment of the access control policies protecting the information exchanged in a distributed sy ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
system, but none of them addresses the dynamicity characterizing virtual organizations. In this paper we propose a dynamic hiearchical attribute-based encryption (D-HABE) scheme that allows the institutions in a virtual organiza-tion to encrypt information according to an attribute-based policy in such a

Attribute-Based Broadcast Encryption Scheme Made Efficient

by David Lubicz, Thomas Sirvent
"... Abstract. In this paper, we describe a new broadcast encryption scheme for stateless receivers. The main difference between our scheme and the classical ones derived from the complete subtree paradigm is that the group of privileged users is described by attributes. Actually, some real applications ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
have been described where the use of a more adaptable access structure brings more efficiency and ease of deployment. On the other side, the decryption algorithm in so far existing attribute-based encryption schemes adapted for broadcast applications is time-consuming for the receiver, since it entails

Improving privacy and security in multi-authority attribute-based encryption

by Melissa Chase, Sherman S. M. Chow - In Proceedings of the 16th ACM Conference on Computer and Communications Security , 2009
"... Attribute based encryption (ABE) [13] determines decryp-tion ability based on a user’s attributes. In a multi-authority ABE scheme, multiple attribute-authorities monitor differ-ent sets of attributes and issue corresponding decryption keys to users, and encryptors can require that a user ob-tain ke ..."
Abstract - Cited by 110 (2 self) - Add to MetaCart
Attribute based encryption (ABE) [13] determines decryp-tion ability based on a user’s attributes. In a multi-authority ABE scheme, multiple attribute-authorities monitor differ-ent sets of attributes and issue corresponding decryption keys to users, and encryptors can require that a user ob

Enhancing Attribute-Based Encryption with Attribute Hierarchy

by Jin Li, Qian Wang, Cong Wang, Kui Ren , 2009
"... Attribute-based encryption (ABE) has been envisioned as a promising cryptographic primitive for realizing secure and flexible access control. However, ABE is being criticized for its high scheme overhead as extensive pairing operations are usually required. In this paper, we focus on improving the e ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Attribute-based encryption (ABE) has been envisioned as a promising cryptographic primitive for realizing secure and flexible access control. However, ABE is being criticized for its high scheme overhead as extensive pairing operations are usually required. In this paper, we focus on improving

Attribute-Based Traitor Tracing

by Yong-tao Wang, Ke-fei Chen, Jian-hong Chen , 2011
"... In this paper, we focus on traitor tracing scheme in attribute-based encryption (ABE) scenarios. A well-known concern in the setting of attribute-based encryption is that a user (or set of colluding users) can create a new key (or decryption device) by using his legal one and distribute it for malic ..."
Abstract - Add to MetaCart
In this paper, we focus on traitor tracing scheme in attribute-based encryption (ABE) scenarios. A well-known concern in the setting of attribute-based encryption is that a user (or set of colluding users) can create a new key (or decryption device) by using his legal one and distribute

Decentralized Attribute-Based Signatures

by Tatsuaki Okamoto, Katsuyuki Takashima , 2011
"... Abstract. In this paper, we present the first decentralized multi-authority attribute-based signature (DMA-ABS) scheme, in which no central authority and no trusted setup are required. The proposed DMA-ABS scheme for general (non-monotone) predicates is fully secure (adaptive-predicate unforgeable a ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
Abstract. In this paper, we present the first decentralized multi-authority attribute-based signature (DMA-ABS) scheme, in which no central authority and no trusted setup are required. The proposed DMA-ABS scheme for general (non-monotone) predicates is fully secure (adaptive-predicate unforgeable

Fully Secure Unbounded Inner-Product and Attribute-Based Encryption

by Tatsuaki Okamoto, Katsuyuki Takashima , 2012
"... In this paper, we present the first inner-product encryption (IPE) schemes that are unbounded in the sense that the public parameters do not impose additional limitations on the predicates and attributes used for encryption and decryption keys. All previous IPE schemes were bounded, or have a bound ..."
Abstract - Cited by 10 (0 self) - Add to MetaCart
-product relation is generalized, where the two vectors of inner-product can be different sizes and it provides a great improvement of efficiency in many applications. We also present the first fully secure unbounded attribute-based encryption (ABE) schemes, and the security is proven under the DLIN assumption

On multiauthority ciphertext-policy attribute-based encryption

by Stefan Katzenbeisser, Claudia Eckert - Bulletin of the Korean Mathematical Society (B-KMS , 2009
"... Abstract. In classical encryption schemes, data is encrypted under a single key that is associated with a user or group. In Ciphertext-Policy Attribute-Based Encryption(CP-ABE) keys are associated with attributes of users, given to them by a central trusted authority, and data is en-crypted under a ..."
Abstract - Cited by 7 (1 self) - Add to MetaCart
Abstract. In classical encryption schemes, data is encrypted under a single key that is associated with a user or group. In Ciphertext-Policy Attribute-Based Encryption(CP-ABE) keys are associated with attributes of users, given to them by a central trusted authority, and data is en-crypted under a
Next 10 →
Results 1 - 10 of 405
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University