File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-642-23822-2_16
- Scopus: eid_2-s2.0-80052991483
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles
Title | Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles |
---|---|
Authors | |
Keywords | ciphertext-policy Attribute based encryption multi-authority |
Issue Date | 2011 |
Citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, v. 6879 LNCS, p. 278-297 How to Cite? |
Abstract | Recently Lewko and Waters proposed the first fully secure multi-authority ciphertext-policy attribute-based encryption (CP-ABE) system in the random oracle model, and leave the construction of a fully secure multi-authority CP-ABE in the standard model as an open problem. Also, there is no CP-ABE system which can completely prevent individual authorities from decrypting ciphertexts. In this paper, we propose a new multi-authority CP-ABE system which addresses these two problems positively. In this new system, there are multiple Central Authorities (CAs) and Attribute Authorities (AAs), the CAs issue identity-related keys to users and are not involved in any attribute related operations, AAs issue attribute-related keys to users and each AA manages a different domain of attributes. The AAs operate independently from each other and do not need to know the existence of other AAs. Messages can be encrypted under any monotone access structure over the entire attribute universe. The system is adaptively secure in the standard model with adaptive authority corruption, and can support large attribute universe. © 2011 Springer-Verlag. |
Persistent Identifier | http://hdl.handle.net/10722/260183 |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Liu, Zhen | - |
dc.contributor.author | Cao, Zhenfu | - |
dc.contributor.author | Huang, Qiong | - |
dc.contributor.author | Wong, Duncan S. | - |
dc.contributor.author | Yuen, Tsz Hon | - |
dc.date.accessioned | 2018-09-12T02:00:39Z | - |
dc.date.available | 2018-09-12T02:00:39Z | - |
dc.date.issued | 2011 | - |
dc.identifier.citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, v. 6879 LNCS, p. 278-297 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10722/260183 | - |
dc.description.abstract | Recently Lewko and Waters proposed the first fully secure multi-authority ciphertext-policy attribute-based encryption (CP-ABE) system in the random oracle model, and leave the construction of a fully secure multi-authority CP-ABE in the standard model as an open problem. Also, there is no CP-ABE system which can completely prevent individual authorities from decrypting ciphertexts. In this paper, we propose a new multi-authority CP-ABE system which addresses these two problems positively. In this new system, there are multiple Central Authorities (CAs) and Attribute Authorities (AAs), the CAs issue identity-related keys to users and are not involved in any attribute related operations, AAs issue attribute-related keys to users and each AA manages a different domain of attributes. The AAs operate independently from each other and do not need to know the existence of other AAs. Messages can be encrypted under any monotone access structure over the entire attribute universe. The system is adaptively secure in the standard model with adaptive authority corruption, and can support large attribute universe. © 2011 Springer-Verlag. | - |
dc.language | eng | - |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.subject | ciphertext-policy | - |
dc.subject | Attribute based encryption | - |
dc.subject | multi-authority | - |
dc.title | Fully secure multi-authority ciphertext-policy attribute-based encryption without random oracles | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/978-3-642-23822-2_16 | - |
dc.identifier.scopus | eid_2-s2.0-80052991483 | - |
dc.identifier.volume | 6879 LNCS | - |
dc.identifier.spage | 278 | - |
dc.identifier.epage | 297 | - |
dc.identifier.eissn | 1611-3349 | - |
dc.identifier.issnl | 0302-9743 | - |