Blind expressive ciphertext policy attribute based encryption for fine grained access control on the encrypted data

被引:0
|
作者
School of Computer Science and Engineering, University of Electronic Science and Technology of China, No.2006 Xiyuan Avenue, West Hi-tech Zone, Chengdu [1 ]
611731, China
不详 [2 ]
机构
来源
Int. J. Netw. Secur. | / 6卷 / 661-671期
关键词
Bilinear map - Ciphertext-policy attribute-based encryptions - Oblivious transfer - Secret sharing - Standard model;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Fine Grained Attribute Based Access Control of Healthcare Data
    Mrema, Edward
    Kumar, Vimal
    2018 12TH INTERNATIONAL SYMPOSIUM ON MEDICAL INFORMATION AND COMMUNICATION TECHNOLOGY (ISMICT), 2018, : 47 - 51
  • [22] Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update
    Jiang, Yinhao
    Susilo, Willy
    Mu, Yi
    Guo, Fuchun
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 39 - 60
  • [23] Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data
    Shiraishi, Yoshiaki
    Nomura, Kenta
    Mohri, Masami
    Naruse, Takeru
    Morii, Masakatu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (10): : 2432 - 2439
  • [24] Expressive ciphertext-policy attribute-based encryption with direct user revocation
    Bai C.
    Zhang Y.
    Ma H.
    Liu Z.
    International Journal of Embedded Systems, 2017, 9 (06) : 495 - 504
  • [25] Expressive Ciphertext Policy Attribute-Based Searchable Encryption for Medical Records in Cloud
    Wu, Qing
    Ma, Xujin
    Zhang, Leyou
    Chen, Yanru
    Ma, Xujin (mxj419@126.com), 1600, Femto Technique Co., Ltd. (23): : 461 - 472
  • [26] Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access Control
    Lang, Bo
    Xu, Runhua
    Duan, Yawei
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 147 - 157
  • [27] Dual-Policy Attribute Based Encryption: Simultaneous Access Control with Ciphertext and Key Policies
    Attrapadung, Nuttapong
    Imai, Hideki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 116 - 125
  • [28] An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited
    Cui, Hui
    Deng, Robert H.
    Lai, Junzuo
    Yi, Xun
    Nepal, Surya
    COMPUTER NETWORKS, 2018, 133 : 157 - 165
  • [29] Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Li, Jiguo
    Wang, Haiping
    Zhang, Yichen
    Shen, Jian
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3339 - 3352
  • [30] A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud
    Praveen Kumar Premkamal
    Syam Kumar Pasupuleti
    P. J. A. Alphonse
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 2693 - 2707