Efficient ciphertext-policy attribute-based encryption with blackbox traceability
Traitor tracing scheme is a paradigm to classify the users who illegal use of their decryption keys in cryptosystems. In the ciphertext-policy attribute-based cryptosystem, the decryption key usually contains the users’ attributes, while the real identities are hidden. The decryption key with hidden...
Saved in:
Main Authors: | XU, Shengmin, YUAN, Jiaming, XU, Guowen, Li, Yingjiu, LIU, Ximeng, ZHANG, Yinghui, YANG, Zuobin |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2020
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/5179 https://ink.library.smu.edu.sg/context/sis_research/article/6182/viewcontent/Efficient_ciphertext_policy_2020_av.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Efficient attribute-based encryption with blackbox traceability
by: XU, Shengmin, et al.
Published: (2018) -
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption
by: LAI, Junzuo, et al.
Published: (2014) -
Online/Offline traceable attribute-based encryption [in Chinese]
by: ZHANG, Kai, et al.
Published: (2018) -
Attribute-based encryption with verifiable outsourced decryption
by: LAI, Junzuo, et al.
Published: (2013) -
Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation
by: XU, Shengmin, et al.
Published: (2019)