Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation

2015 ◽  
Vol 295 ◽  
pp. 221-231 ◽  
Author(s):  
Yanfeng Shi ◽  
Qingji Zheng ◽  
Jiqiang Liu ◽  
Zhen Han
2019 ◽  
Vol 470 ◽  
pp. 175-188 ◽  
Author(s):  
Jiguo Li ◽  
Qihong Yu ◽  
Yichen Zhang ◽  
Jian Shen

2020 ◽  
Author(s):  
yunxiu ye ◽  
Zhenfu Cao ◽  
Jiachen Shen

Abstract Attribute-based encryption received widespread attention as soon as it proposes. However, due to its specific characteristics, the attribute-based access control method is not flexible enough in actual operation. In addition, since access authorities are determined according to users' attributes, users sharing the same attributes are difficult to distinguish. Once a malicious user makes illicit gains by their decryption authorities, it is difficult to trace specific users. This paper follows the practical demand to propose a more flexible key-policy attribute-based encryption scheme with black-box traceability. The scheme has a constant number of constant parameters which can be utilized to construct attribute-related parameters flexibly, and the method of traitor tracing in broadcast encryption is introduced to achieve effective malicious user tracing. In addition, the security and feasibility can be proved by the security proofs and performance evaluation in this paper.


2016 ◽  
Vol 18 (05) ◽  
pp. 64-71 ◽  
Author(s):  
Prof. Dipa Dharmadhikari ◽  
Sonali Deshpande

Sign in / Sign up

Export Citation Format

Share Document