Forward-secure ciphertext-policy attribute-based encryption scheme
To mitigate the damage of key exposure in the context of ciphertext-policy attribute-based encryption (CP-ABE). The syntax and security model of forward-secure CP-ABE was presented. Then, a concreted forward-secure CP-ABE scheme was constructed. Under the l-BDHE assumption, the proposed scheme was p...
| Published in: | Tongxin xuebao |
|---|---|
| Main Authors: | EIJiang-hong W, IUWen-fen L, UXue-xian H |
| Format: | Article |
| Language: | Chinese |
| Published: |
Editorial Department of Journal on Communications
2014-07-01
|
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/thesisDetails#10.3969/j.issn.1000-436x.2014.07.005 |
Similar Items
Forward-secure ciphertext-policy attribute-based encryption scheme
by: EIJiang-hong W, et al.
Published: (2014-07-01)
by: EIJiang-hong W, et al.
Published: (2014-07-01)
Efficient and provably secure attribute-based online/offline encryption schemes
by: Hai-ying MA, et al.
Published: (2014-07-01)
by: Hai-ying MA, et al.
Published: (2014-07-01)
Efficient and provably secure attribute-based online/offline encryption schemes
by: Hai-ying MA, et al.
Published: (2014-07-01)
by: Hai-ying MA, et al.
Published: (2014-07-01)
Provably secure and efficient escrowable public key encryption schemes
by: Wen-hao LIU, et al.
Published: (2014-07-01)
by: Wen-hao LIU, et al.
Published: (2014-07-01)
Provably secure and efficient escrowable public key encryption schemes
by: Wen-hao LIU, et al.
Published: (2014-07-01)
by: Wen-hao LIU, et al.
Published: (2014-07-01)
Attribute-Based Searchable Encryption With Forward Security for Cloud-Assisted IoT
by: Dilxat Ghopur
Published: (2024-01-01)
by: Dilxat Ghopur
Published: (2024-01-01)
A Searchable Encryption with Forward/Backward Security and Constant Storage
by: Suzhen Cao, et al.
Published: (2023-02-01)
by: Suzhen Cao, et al.
Published: (2023-02-01)
Novel construction of forward-secure public-key encryption in the standard model
by: Yang LU, et al.
Published: (2014-02-01)
by: Yang LU, et al.
Published: (2014-02-01)
Novel construction of forward-secure public-key encryption in the standard model
by: Yang LU, et al.
Published: (2014-02-01)
by: Yang LU, et al.
Published: (2014-02-01)
Smart Contract-Assisted Dynamically Searchable Encryption Scheme with Forward and Backward Security
by: DING Xiaohui, CAO Suzhen, WANG Caifen
Published: (2022-07-01)
by: DING Xiaohui, CAO Suzhen, WANG Caifen
Published: (2022-07-01)
Key Assignment Schemes with Authenticated Encryption, revisited
by: Jeroen Pijnenburg, et al.
Published: (2020-07-01)
by: Jeroen Pijnenburg, et al.
Published: (2020-07-01)
Key-Aggregate Searchable Encryption, Revisited: Formal Foundations for Cloud Applications, and Their Implementation
by: Masahiro Kamimura, et al.
Published: (2020-01-01)
by: Masahiro Kamimura, et al.
Published: (2020-01-01)
EPN:encryption padding for NTRU with provable security
by: MU Ning-bo, et al.
Published: (2008-01-01)
by: MU Ning-bo, et al.
Published: (2008-01-01)
EPN:encryption padding for NTRU with provable security
by: MU Ning-bo, et al.
Published: (2008-01-01)
by: MU Ning-bo, et al.
Published: (2008-01-01)
New adaptively secure key-policy attribute-based encryption scheme
by: Song LUO, et al.
Published: (2012-09-01)
by: Song LUO, et al.
Published: (2012-09-01)
New adaptively secure key-policy attribute-based encryption scheme
by: Song LUO, et al.
Published: (2012-09-01)
by: Song LUO, et al.
Published: (2012-09-01)
Fairly verifiable multi-user homomorphic proxy re-encryption scheme
by: HOU Jinqiu, et al.
Published: (2025-03-01)
by: HOU Jinqiu, et al.
Published: (2025-03-01)
A certificateless Multi-receiver Encryption scheme based on SM2 signature algorithm
by: Jinglin Zou, et al.
Published: (2023-03-01)
by: Jinglin Zou, et al.
Published: (2023-03-01)
Forward-Secure Public-Key Encryption Scheme Based on SM9
by: HUANG Wenfeng, XU Shengmin, MA Jinhua, NING Jianting, WU Wei
Published: (2024-12-01)
by: HUANG Wenfeng, XU Shengmin, MA Jinhua, NING Jianting, WU Wei
Published: (2024-12-01)
Provably Secure Encryption Schemes With Zero Setup and Linear Speed by Using Rubik’s Cubes
by: Ping Pan, et al.
Published: (2020-01-01)
by: Ping Pan, et al.
Published: (2020-01-01)
Integrating Classical Preprocessing into an Optical Encryption Scheme
by: Hai Pham, et al.
Published: (2019-09-01)
by: Hai Pham, et al.
Published: (2019-09-01)
Conditions for anonymity in some generic public-key encryption constructions
by: TIAN Yuan, et al.
Published: (2009-01-01)
by: TIAN Yuan, et al.
Published: (2009-01-01)
Conditions for anonymity in some generic public-key encryption constructions
by: TIAN Yuan, et al.
Published: (2009-01-01)
by: TIAN Yuan, et al.
Published: (2009-01-01)
Ciphertext policy attribute-based encryption scheme supporting direct revocation
by: Xi-xi YAN, et al.
Published: (2016-05-01)
by: Xi-xi YAN, et al.
Published: (2016-05-01)
Ciphertext policy attribute-based encryption scheme supporting direct revocation
by: Xi-xi YAN, et al.
Published: (2016-05-01)
by: Xi-xi YAN, et al.
Published: (2016-05-01)
CP-ABSE: A Ciphertext-Policy Attribute-Based Searchable Encryption Scheme
by: Hui Yin, et al.
Published: (2019-01-01)
by: Hui Yin, et al.
Published: (2019-01-01)
Efficient chosen-ciphertext secure proxy re-encryption scheme
by: Wei-wei ZHANG, et al.
Published: (2013-07-01)
by: Wei-wei ZHANG, et al.
Published: (2013-07-01)
Efficient chosen-ciphertext secure proxy re-encryption scheme
by: Wei-wei ZHANG, et al.
Published: (2013-07-01)
by: Wei-wei ZHANG, et al.
Published: (2013-07-01)
Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security
by: Jingwei Lu, et al.
Published: (2023-02-01)
by: Jingwei Lu, et al.
Published: (2023-02-01)
An Attribute-Based Encryption Scheme to Secure Fog Communications
by: Arwa Alrawais, et al.
Published: (2017-01-01)
by: Arwa Alrawais, et al.
Published: (2017-01-01)
Adaptively secure attribute-based encryption for traitor tracing
by: ying MAHai, et al.
Published: (2016-01-01)
by: ying MAHai, et al.
Published: (2016-01-01)
Adaptively secure attribute-based encryption for traitor tracing
by: ying MAHai, et al.
Published: (2016-01-01)
by: ying MAHai, et al.
Published: (2016-01-01)
Asymmetric cryptography and practical security
by: David Pointcheval
Published: (2002-12-01)
by: David Pointcheval
Published: (2002-12-01)
Outsourced attribute-based encryption with policy update
by: Su-qing LIN
Published: (2016-05-01)
by: Su-qing LIN
Published: (2016-05-01)
Provably secure private key protection scheme for smart mobile terminal
by: Jun MA, et al.
Published: (2012-12-01)
by: Jun MA, et al.
Published: (2012-12-01)
Provably secure private key protection scheme for smart mobile terminal
by: Jun MA, et al.
Published: (2012-12-01)
by: Jun MA, et al.
Published: (2012-12-01)
Attacking Pairing-Free Attribute-Based Encryption Schemes
by: Javier Herranz
Published: (2020-01-01)
by: Javier Herranz
Published: (2020-01-01)
An Attribute-based Encryption Scheme for Ciphertext Policy that Supports Attribute Revocation
by: WANG Jingyu, ZHOU Xuejuan
Published: (2021-07-01)
by: WANG Jingyu, ZHOU Xuejuan
Published: (2021-07-01)
Correcting the security definition of the Bellare-Rogaway 3PKD model
by: LIU Jun1, et al.
Published: (2007-01-01)
by: LIU Jun1, et al.
Published: (2007-01-01)
Correcting the security definition of the Bellare-Rogaway 3PKD model
by: LIU Jun1, et al.
Published: (2007-01-01)
by: LIU Jun1, et al.
Published: (2007-01-01)
Similar Items
-
Forward-secure ciphertext-policy attribute-based encryption scheme
by: EIJiang-hong W, et al.
Published: (2014-07-01) -
Efficient and provably secure attribute-based online/offline encryption schemes
by: Hai-ying MA, et al.
Published: (2014-07-01) -
Efficient and provably secure attribute-based online/offline encryption schemes
by: Hai-ying MA, et al.
Published: (2014-07-01) -
Provably secure and efficient escrowable public key encryption schemes
by: Wen-hao LIU, et al.
Published: (2014-07-01) -
Provably secure and efficient escrowable public key encryption schemes
by: Wen-hao LIU, et al.
Published: (2014-07-01)
