Efficient ciphertext-policy attribute-based encryption with blackbox traceability

Traitor tracing scheme is a paradigm to classify the users who illegal use of their decryption keys in cryptosystems. In the ciphertext-policy attribute-based cryptosystem, the decryption key usually contains the users’ attributes, while the real identities are hidden. The decryption key with hidden...

Full description

Saved in:
Bibliographic Details
Main Authors: XU, Shengmin, YUAN, Jiaming, XU, Guowen, Li, Yingjiu, LIU, Ximeng, ZHANG, Yinghui, YANG, Zuobin
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2020
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/5179
https://ink.library.smu.edu.sg/context/sis_research/article/6182/viewcontent/Efficient_ciphertext_policy_2020_av.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English