File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-642-38033-4_5
- Scopus: eid_2-s2.0-84883377340
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Attribute Specified Identity-Based Encryption
Title | Attribute Specified Identity-Based Encryption |
---|---|
Authors | |
Keywords | attributes certificateless public key encryption identity-based encryption key escrow |
Issue Date | 2013 |
Publisher | Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ |
Citation | The 9th International Conference on Information Security Practice and Experience (ISPEC 2013), Lanzhou, China, 12-14 May 2013. In Lecture Notes in Computer Science, 2013, v. 7863, p. 60-74 How to Cite? |
Abstract | Fine-grained access control of encrypted data without trusted third party is a challenging task. Using the simple attribute-based encryption has the problem of key escrow, since there exists a trusted authority who is able to generate the secret keys of all users. Delegating this ability to multiple authorities can only minimize the risk, but not eliminating the possibility that all authorities may collude. We develop a new cryptosystem called Attribute Specified Identity-Based Encryption (AS-IBE) to solve this problem. We employ the idea of certificateless encryption and extend it to the attribute-based setting. Each user chooses his own public and secret key pairs to use, in addition to his attribute-based secret key. Therefore, the authority cannot decrypt without the knowledge the user’s own secret key. Yet, the resulting AS-IBE system has some fundamental differences with the original attribute-based encryption. In this paper, we give the security model for the new AS-IBE cryptosystems, and propose two variants for the construction, namely the key policy AS-IBE and ciphertext policy AS-IBE. |
Description | Lecture Notes in Computer Science, vol. 7863 entitled: Information security practice and experience: 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013 : proceedings |
Persistent Identifier | http://hdl.handle.net/10722/184859 |
ISBN | |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Xiong, H | en_US |
dc.contributor.author | Yuen, TH | en_US |
dc.contributor.author | Zhang, C | en_US |
dc.contributor.author | He, YJ | en_US |
dc.contributor.author | Yiu, SM | en_US |
dc.date.accessioned | 2013-07-15T10:14:43Z | - |
dc.date.available | 2013-07-15T10:14:43Z | - |
dc.date.issued | 2013 | en_US |
dc.identifier.citation | The 9th International Conference on Information Security Practice and Experience (ISPEC 2013), Lanzhou, China, 12-14 May 2013. In Lecture Notes in Computer Science, 2013, v. 7863, p. 60-74 | en_US |
dc.identifier.isbn | 9783642380327 | - |
dc.identifier.issn | 0302-9743 | en_US |
dc.identifier.uri | http://hdl.handle.net/10722/184859 | - |
dc.description | Lecture Notes in Computer Science, vol. 7863 entitled: Information security practice and experience: 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013 : proceedings | - |
dc.description.abstract | Fine-grained access control of encrypted data without trusted third party is a challenging task. Using the simple attribute-based encryption has the problem of key escrow, since there exists a trusted authority who is able to generate the secret keys of all users. Delegating this ability to multiple authorities can only minimize the risk, but not eliminating the possibility that all authorities may collude. We develop a new cryptosystem called Attribute Specified Identity-Based Encryption (AS-IBE) to solve this problem. We employ the idea of certificateless encryption and extend it to the attribute-based setting. Each user chooses his own public and secret key pairs to use, in addition to his attribute-based secret key. Therefore, the authority cannot decrypt without the knowledge the user’s own secret key. Yet, the resulting AS-IBE system has some fundamental differences with the original attribute-based encryption. In this paper, we give the security model for the new AS-IBE cryptosystems, and propose two variants for the construction, namely the key policy AS-IBE and ciphertext policy AS-IBE. | - |
dc.language | eng | en_US |
dc.publisher | Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ | en_US |
dc.relation.ispartof | Lecture Notes in Computer Science | en_US |
dc.rights | The original publication is available at www.springerlink.com | - |
dc.subject | attributes | - |
dc.subject | certificateless public key encryption | - |
dc.subject | identity-based encryption | - |
dc.subject | key escrow | - |
dc.title | Attribute Specified Identity-Based Encryption | en_US |
dc.type | Conference_Paper | en_US |
dc.identifier.email | Yuen, TH: johnyuen@hku.hk | en_US |
dc.identifier.email | Zhang, C: congz@hku.hk | en_US |
dc.identifier.email | Yiu, SM: smyiu@cs.hku.hk | en_US |
dc.identifier.authority | Yiu, SM=rp00207 | en_US |
dc.identifier.doi | 10.1007/978-3-642-38033-4_5 | - |
dc.identifier.scopus | eid_2-s2.0-84883377340 | - |
dc.identifier.hkuros | 215067 | en_US |
dc.identifier.volume | 7863 | en_US |
dc.identifier.spage | 60 | en_US |
dc.identifier.epage | 74 | en_US |
dc.publisher.place | Germany | - |
dc.identifier.issnl | 0302-9743 | - |