monotone span programs
Recently Published Documents


TOTAL DOCUMENTS

15
(FIVE YEARS 2)

H-INDEX

8
(FIVE YEARS 1)

2020 ◽  
Vol 2020 ◽  
pp. 1-18
Author(s):  
Isaac Amankona Obiri ◽  
Qi Xia ◽  
Hu Xia ◽  
Kwame Opuni-Boachie Obour Agyekum ◽  
Kwame Omono Asamoah ◽  
...  

Key-policy attribute-based encryption (KP-ABE) is the cryptographic primitive which enables fine grained access control while still providing end-to-end encryption. Although traditional encryption schemes can provide end-to-end encryption, users have to either share the same decryption keys or the data have to be stored in multiple instances which are encrypted with different keys. Both of these options are undesirable. However, KP-ABE can provide less key overhead compared to the traditional encryption schemes. While there are a lot of KP-ABE schemes, none of them simultaneously supports multiuse of attributes, adaptive security, monotone span programs, and static security assumption. Hence, we propose a fully secure KP-ABE scheme for monotone span programs in prime-order group. This scheme uses selective security proof techniques to obtain the requisite ingredients for full security proof. This strengthens the correlation between selective and full security models and enables the transition of the best qualities in selective security models to fully secure systems. The security proof is based on decisional linear assumption and three-party Diffie–Hellman assumption.


2005 ◽  
Vol 34 (5) ◽  
pp. 1196-1215 ◽  
Author(s):  
Amos Beimel ◽  
Enav Weinreb

COMBINATORICA ◽  
1999 ◽  
Vol 19 (3) ◽  
pp. 301-319 ◽  
Author(s):  
László Babai ◽  
Anna Gál ◽  
Avi Wigderson

Sign in / Sign up

Export Citation Format

Share Document