Journal ArticleDOI
Attribute-Based Encryption with Partially Hidden Ciphertext Policies
Citations
More filters
Journal ArticleDOI
A Survey of Provably Secure Searchable Encryption
TL;DR: The notion of provably secure searchable encryption (SE) is surveyed by giving a complete and comprehensive overview of the two main SE techniques: searchable symmetric encryption (SSE) and public key encryption with keyword search (PEKS).
Journal ArticleDOI
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
TL;DR: This work introduces a new mechanism to enhance CP-ABE schemes that provide protections against this key-delegation abuse issue, and formalizes the security requirements for such a property, and construct a CP- ABE scheme that satisfies the new security requirements.
Book ChapterDOI
Multi-user keyword search scheme for secure data sharing with fine-grained access control
TL;DR: This paper proposes a keyword search scheme for the cryptographic cloud storage based on attribute-based cryptosystems that presents a new keyword search notion: fine-grained access control aware keyword search.
Book ChapterDOI
Searching keywords with wildcards on encrypted data
TL;DR: A new HVE scheme is constructed, based on bilinear groups of prime order, which supports vectors over any alphabet, and is proved security in a selective model, under the decision linear assumption.
Journal Article
Searching Keywords with Wildcards on Encrypted Data
TL;DR: In this paper, a new HVE scheme based on bilinear groups of prime order was proposed, which supports vectors over any alphabet and can hide both the plaintext and public key used for encryption.
References
More filters
Book ChapterDOI
Identity-Based Encryption from the Weil Pairing
Dan Boneh,Matthew K. Franklin +1 more
TL;DR: This work proposes a fully functional identity-based encryption scheme (IBE) based on the Weil pairing that has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem.
Proceedings ArticleDOI
Ciphertext-Policy Attribute-Based Encryption
TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Proceedings ArticleDOI
Attribute-based encryption for fine-grained access control of encrypted data
TL;DR: This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.
Book ChapterDOI
Fuzzy identity-based encryption
Amit Sahai,Brent Waters +1 more
TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Posted Content
Fuzzy Identity Based Encryption.
Amit Sahai,Brent Waters +1 more
TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.