Journal ArticleDOI
Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs
Zengpeng Li,Zengpeng Li,Zengpeng Li,Vishal Sharma,Chunguang Ma,Chunpeng Ge,Chunpeng Ge,Willy Susilo +7 more
Reads0
Chats0
TLDR
This paper presents a meta-modelling framework that automates the very labor-intensive and therefore time-heavy and expensive and expensive process of manually cataloging and cataloging public data sets.Abstract:
College of Computer Science and Technology, Qingdao University, Qingdao 266071, China; Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang 550025, China; ISTD Pillar, Singapore University of Technology and Design (SUTD), Singapore 487372, Singapore; College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao 266590, China; College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China; School of Computing and Information Technology, University of Wollongong, Wollongong NSW 2522, Australiaread more
Citations
More filters
Journal ArticleDOI
Ciphertext-Policy Attribute-Based Encryption with Outsourced Set Intersection in Multimedia Cloud Computing
Yanfeng Shi,Shuo Qiu +1 more
TL;DR: In this article, a ciphertext-policy attribute-based encryption with outsourced set intersection for multimedia cloud computing was proposed, which is the first cryptographic algorithm supporting a fully outsourced encrypted storage, computation delegation, fine-grained authorization security for ciphertextpolicy model, without relying on an online trusted authority or data owners, and multi-elements set, simultaneously.
Journal ArticleDOI
Multi authority Ciphertext-Policy Attribute-Based encryption for security enhancement in cloud storage unit
TL;DR: In this paper , a multi-authority Ciphertext-Policy Attribute-Based Encryption (MCP-ABE) is proposed to provide high security of multi authority with different traceable and dynamic policy updating procedure, which is implemented in Java and analyzed with performance metrices such as key size, computation time and functionality.
Journal ArticleDOI
HAPPS: A Hidden Attribute and Privilege-Protection Data-Sharing Scheme With Verifiability
TL;DR: Li et al. as discussed by the authors proposed a new data access control strategy (i.e., attribute-hidden zero-knowledge proof-at-ZKP) to hide user identity and attributes during the authorization process.
Proceedings ArticleDOI
Dynamic Attribute-Based Encryption Scheme Based on Hierarchical Time Tree
TL;DR: An attribute-based encryption scheme that can authorize new temporary users and effectively revocation temporary user access rights is proposed, which not only improves the scalability of attribute encryption scheme, but also reduces the computational cost of users.
References
More filters
Book ChapterDOI
Constrained Pseudorandom Functions and Their Applications
Dan Boneh,Brent Waters +1 more
TL;DR: It is shown that PRFs can be used to construct powerful primitives such as identity-based key exchange and a broadcast encryption system with optimal ciphertext size and several open problems relating to this new concept are put forward.
Proceedings ArticleDOI
Delegatable pseudorandom functions and applications
TL;DR: Two DPRF constructions are built upon the well-known tree-based GGM PRF family and feature only logarithmic delegation size in the number of values conforming to the policy predicate, and it is shown that the second construction is also policy private.
Book ChapterDOI
Functional Signatures and Pseudorandom Functions
TL;DR: This work defines and provides a sample construction of a functional pseudorandom function family for prefix-fixing functions, which yields punctured Pseudo-Pseudorandom Functions, which have proven an invaluable tool in recent advances in obfuscation.
Posted Content
Constrained Pseudorandom Functions and Their Applications.
Dan Boneh,Brent Waters +1 more
TL;DR: In this article, the concept of constrained pseudorandom functions (CPRFs) was introduced and used for identity-based key exchange and broadcast encryption with optimal ciphertext size.
Posted Content
Delegatable Pseudorandom Functions and Applications.
TL;DR: In this paper, the problem of delegating the evaluation of a pseudorandom function (PRF) to an untrusted proxy and introduce a novel cryptographic primitive called delegatable pseudo-random functions, or DPRFs for short, enables a proxy to evaluate a PRF on a strict subset of its domain using a trapdoor derived from the DPRF secret key.