• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,087
Next 10 →

Key-policy Attribute-based Encryption for Boolean Circuits from Bilinear Maps

by unknown authors
"... Abstract. We propose the first Key-policy Attribute-based Encryption (KP-ABE) scheme for (monotone) Boolean circuits based on bilinear maps. The construction is based on secret sharing and just one bilinear map, and can be viewed as an extension of the KP-ABE scheme in [7]. Selective security of the ..."
Abstract - Add to MetaCart
Abstract. We propose the first Key-policy Attribute-based Encryption (KP-ABE) scheme for (monotone) Boolean circuits based on bilinear maps. The construction is based on secret sharing and just one bilinear map, and can be viewed as an extension of the KP-ABE scheme in [7]. Selective security

An Efficient Key-Policy Attribute-Based Encryption Scheme with Constant Ciphertext

by Changji Wang , Jianfa Luo - Length in Mathematical Problems in Engineering Volume 19 , Article ID 810969 , 2013
"... There is an acceleration of adoption of cloud computing among enterprises. However, moving the infrastructure and sensitive data from trusted domain of the data owner to public cloud will pose severe security and privacy risks. Attribute-based encryption (ABE) is a new cryptographic primitive which ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
which provides a promising tool for addressing the problem of secure and fine-grained data sharing and decentralized access control. Key-policy attribute-based encryption (KP-ABE) is an important type of ABE, which enables senders to encrypt messages under a set of attributes and private keys

MultiAuthority and Key Policy Attribute based Encryption

by Pooja K. Patil
"... Personal Health Record (PHR) is a web based set of tools that provides the facility to exchange and maintain a complete electronic health record of a patient. Third-party service providers are available to maintain PHRs like HealthVault1, Google Health or Web MD. These applications allow individuals ..."
Abstract - Add to MetaCart
grained access remains a major concern. Taking these issues into consideration the paper proposes a model for securing PHR stored in semitrusted third party servers by adopting attribute-based encryption (ABE). The advantage of ABE is, the complexity of encryption and decryption linearly increases

KEY-POLICY ATTRIBUTE BASED ENCRYPTION TO SECURE DATA STORED IN CLOUD

by C Vinoth , G R Anantha Raman
"... ABSTRACT As more sensitive data is shared and stored by third-party sites on the Internet, the data in these sites will need to encrypt. The main drawback of encrypting data is that it can be selectively shared only at a coarse-grained level giving another party your private key). We progress a new ..."
Abstract - Add to MetaCart
new cryptosystem for fine-grained sharing of reencrypted data that we call Key-Policy Attribute-Based Encryption (KP-ABE). In our cryptosystem, cipher texts are labeled with sets of attributes and private keys are associated with access structures that control which cipher texts a user is able

Protecting User Privacy By Using Decentralized Key-Policy Attribute-Based Encryption

by unknown authors
"... can issue the secret key to user independently without any co-operation of a central authority. It means that that there is no need to trust on to the central authority due to this even if multiple authorities are corrupted they can’t collect the users attributes by tracing users GID. In decentraliz ..."
Abstract - Add to MetaCart
. In decentralized key-attribute based encryption both the user secret key and the ciphertext are label with set of different attribute. Message can be encrypt under set of attribute so if anyone want the decrypt the ciphertext the receiver must obtain data only when there is match between his secret key

Efficient Key-policy Attribute-based Encryption for General Boolean Circuits from Multilinear Maps

by Constantin Cătălin Drăgan, Ferucio Laurent¸iu T Iplea
"... Abstract. We propose an efficient Key-policy Attribute-based Encryption (KP-ABE) scheme for general (monotone) Boolean circuits based on secret sharing and on a very particular and simple form of leveled multilinear maps, called chained multilinear maps. The number of decryption key components is su ..."
Abstract - Add to MetaCart
Abstract. We propose an efficient Key-policy Attribute-based Encryption (KP-ABE) scheme for general (monotone) Boolean circuits based on secret sharing and on a very particular and simple form of leveled multilinear maps, called chained multilinear maps. The number of decryption key components

Attribute-based encryption for fine-grained access control of encrypted data

by Vipul Goyal, Amit Sahai, Omkant Pandey, Brent Waters - In Proc. of ACMCCS’06 , 2006
"... As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can be selectively shared only at a coarse-grained level (i.e., giving another party your private key). We develop ..."
Abstract - Cited by 522 (23 self) - Add to MetaCart
develop a new cryptosystem for fine-grained sharing of encrypted data that we call Key-Policy Attribute-Based Encryption (KP-ABE). In our cryptosystem, ciphertexts are labeled with sets of attributes and private keys are associated with access structures that control which ciphertexts a user is able

Attribute-based functional encryption on lattices (Extended Abstract)

by Xavier Boyen , 2012
"... We introduce a broad lattice manipulation technique for expressive cryptography, and use it to realize functional encryption for access structures from post-quantum hardness assumptions. Speci cally, we build an e cient key-policy attribute-based encryption scheme, and prove its security in the sele ..."
Abstract - Cited by 14 (0 self) - Add to MetaCart
We introduce a broad lattice manipulation technique for expressive cryptography, and use it to realize functional encryption for access structures from post-quantum hardness assumptions. Speci cally, we build an e cient key-policy attribute-based encryption scheme, and prove its security

Attribute-Based Encryption for a Subclass of Circuits with Bounded Depth from Lattices

by Xiang Xie, Rui Xue
"... Abstract. In this work, we present two Key-Policy Attribute-Based Encryption (ABE) schemes for some subclass of circuits based on the Learning with Error (LWE) assumption. Our constructions are selectively secure in the standard model. More specifically, our first construction supports a subclass of ..."
Abstract - Add to MetaCart
Abstract. In this work, we present two Key-Policy Attribute-Based Encryption (ABE) schemes for some subclass of circuits based on the Learning with Error (LWE) assumption. Our constructions are selectively secure in the standard model. More specifically, our first construction supports a subclass

Attribute-Based Versions of

by Javier Herranz
"... Abstract. We design in this paper the first attribute-based cryptosystems that work in the classical Discrete Logarithm, pairing-free, setting. The attribute-based signature scheme can be seen as an extension of Schnorr signatures, with adaptive security relying on the Discrete Logarithm Assumption, ..."
Abstract - Add to MetaCart
of our key-policy attribute-based encryption scheme (in particular, with L = 1) is enough to implement the generic transformation of Parno, Raykova and Vaikuntanathan at TCC’2012. As a direct result, we obtain a protocol for the verifiable delegation of computation of boolean functions, which does
Next 10 →
Results 1 - 10 of 1,087
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University