scispace - formally typeset
Journal ArticleDOI

Attribute-Based Encryption with Partially Hidden Ciphertext Policies

About
This article is published in IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.The article was published on 2009-01-01. It has received 21 citations till now. The article focuses on the topics: Attribute-based encryption & On-the-fly encryption.

read more

Citations
More filters
Journal ArticleDOI

A Survey of Provably Secure Searchable Encryption

TL;DR: The notion of provably secure searchable encryption (SE) is surveyed by giving a complete and comprehensive overview of the two main SE techniques: searchable symmetric encryption (SSE) and public key encryption with keyword search (PEKS).
Journal ArticleDOI

Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing

TL;DR: This work introduces a new mechanism to enhance CP-ABE schemes that provide protections against this key-delegation abuse issue, and formalizes the security requirements for such a property, and construct a CP- ABE scheme that satisfies the new security requirements.
Book ChapterDOI

Multi-user keyword search scheme for secure data sharing with fine-grained access control

TL;DR: This paper proposes a keyword search scheme for the cryptographic cloud storage based on attribute-based cryptosystems that presents a new keyword search notion: fine-grained access control aware keyword search.
Book ChapterDOI

Searching keywords with wildcards on encrypted data

TL;DR: A new HVE scheme is constructed, based on bilinear groups of prime order, which supports vectors over any alphabet, and is proved security in a selective model, under the decision linear assumption.
Journal Article

Searching Keywords with Wildcards on Encrypted Data

TL;DR: In this paper, a new HVE scheme based on bilinear groups of prime order was proposed, which supports vectors over any alphabet and can hide both the plaintext and public key used for encryption.
References
More filters
Book ChapterDOI

Identity-Based Encryption from the Weil Pairing

TL;DR: This work proposes a fully functional identity-based encryption scheme (IBE) based on the Weil pairing that has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem.
Proceedings ArticleDOI

Ciphertext-Policy Attribute-Based Encryption

TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Proceedings ArticleDOI

Attribute-based encryption for fine-grained access control of encrypted data

TL;DR: This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.
Book ChapterDOI

Fuzzy identity-based encryption

TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Posted Content

Fuzzy Identity Based Encryption.

TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.