scispace - formally typeset
Journal ArticleDOI

Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs

Reads0
Chats0
TLDR
This paper presents a meta-modelling framework that automates the very labor-intensive and therefore time-heavy and expensive and expensive process of manually cataloging and cataloging public data sets.
Abstract
College of Computer Science and Technology, Qingdao University, Qingdao 266071, China; Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang 550025, China; ISTD Pillar, Singapore University of Technology and Design (SUTD), Singapore 487372, Singapore; College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China; College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China; School of Computing and Information Technology, University of Wollongong, Wollongong NSW 2522, Australia

read more

Citations
More filters
Journal ArticleDOI

Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing

Yanfeng Shi, +1 more
- 03 Nov 2021 - 
TL;DR: In this article, a ciphertext-policy attribute-based encryption with outsourced set intersection for multimedia cloud computing was proposed, which is the first cryptographic algorithm supporting a fully outsourced encrypted storage, computation delegation, fine-grained authorization security for ciphertextpolicy model, without relying on an online trusted authority or data owners, and multi-elements set, simultaneously.
Journal ArticleDOI

Multi authority Ciphertext-Policy Attribute-Based encryption for security enhancement in cloud storage unit

TL;DR: In this paper , a multi-authority Ciphertext-Policy Attribute-Based Encryption (MCP-ABE) is proposed to provide high security of multi authority with different traceable and dynamic policy updating procedure, which is implemented in Java and analyzed with performance metrices such as key size, computation time and functionality.
Journal ArticleDOI

HAPPS: A Hidden Attribute and Privilege-Protection Data-Sharing Scheme With Verifiability

TL;DR: Li et al. as discussed by the authors proposed a new data access control strategy (i.e., attribute-hidden zero-knowledge proof-at-ZKP) to hide user identity and attributes during the authorization process.
Proceedings ArticleDOI

Dynamic Attribute-Based Encryption Scheme Based on Hierarchical Time Tree

TL;DR: An attribute-based encryption scheme that can authorize new temporary users and effectively revocation temporary user access rights is proposed, which not only improves the scalability of attribute encryption scheme, but also reduces the computational cost of users.
References
More filters
Book ChapterDOI

Constrained Pseudorandom Functions and Their Applications

TL;DR: It is shown that PRFs can be used to construct powerful primitives such as identity-based key exchange and a broadcast encryption system with optimal ciphertext size and several open problems relating to this new concept are put forward.
Proceedings ArticleDOI

Delegatable pseudorandom functions and applications

TL;DR: Two DPRF constructions are built upon the well-known tree-based GGM PRF family and feature only logarithmic delegation size in the number of values conforming to the policy predicate, and it is shown that the second construction is also policy private.
Book ChapterDOI

Functional Signatures and Pseudorandom Functions

TL;DR: This work defines and provides a sample construction of a functional pseudorandom function family for prefix-fixing functions, which yields punctured Pseudo-Pseudorandom Functions, which have proven an invaluable tool in recent advances in obfuscation.
Posted Content

Constrained Pseudorandom Functions and Their Applications.

TL;DR: In this article, the concept of constrained pseudorandom functions (CPRFs) was introduced and used for identity-based key exchange and broadcast encryption with optimal ciphertext size.
Posted Content

Delegatable Pseudorandom Functions and Applications.

TL;DR: In this paper, the problem of delegating the evaluation of a pseudorandom function (PRF) to an untrusted proxy and introduce a novel cryptographic primitive called delegatable pseudo-random functions, or DPRFs for short, enables a proxy to evaluate a PRF on a strict subset of its domain using a trapdoor derived from the DPRF secret key.
Related Papers (5)