Improving privacy and security in multi-authority attribute-based encryption
Citations
1,333 citations
Cites background from "Improving privacy and security in m..."
...The setting where attributes can be distributed by multiple parties is considered in [17, 18]....
[...]
1,057 citations
Cites methods from "Improving privacy and security in m..."
...We give detailed overviews to the YWRL scheme and CC MA-ABE scheme in the supplementary material, which can be found on the Computer Society Digital Library at http://doi.ieeecomputersociety.org/10.1109/TPDS.2012.97....
[...]
...We also propose a suite of access control mechanisms by uniquely combining the technical strengths of both CC MA-ABE [21] and the YWRL ABE scheme [9]....
[...]
1,005 citations
877 citations
829 citations
References
6,902 citations
4,364 citations
"Improving privacy and security in m..." refers methods in this paper
...If it turns out that this is the authority from which the adversary requests insu.cient attributes for user u, then we are all set, and we can simply reuse the Sahai-Waters techniques....
[...]
...[2] John Bethencourt, Amit Sahai, and Brent Waters....
[...]
...In 2005, Sahai and Waters [13] proposed a system (described in more recent terminology as a key-policy attribute-based encryption (ABE) system for threshold policies) in which a sender can encrypt a message specifying an attribute set and a number d, such that only a recipient with at least d of the given attributes can decrypt the message....
[...]
...[12] Rafail Ostrovsky, Amit Sahai, and Brent Waters....
[...]
...The idea here (suggested by Waters) idea is to eliminate the need for the CA by using a set of PRFs whose output values on any particular input always sum to zero....
[...]
4,257 citations
"Improving privacy and security in m..." refers background or methods in this paper
...6.2 Complex Access Structure Another limitation of our basic construction as described in Section 5 is that it only supports simple dk-out-of-n threshold policies, while Goyal et al. s construction [8] supports a tree access structure....
[...]
...[8], and Chase [5], and of our construction rely on the intractability of the DBDH problem....
[...]
...Our anonymous key issuing protocol and the removal of the central authority technique can also be applied to the multi-authority version of the large universe and complex access structure construction in [8]....
[...]
...Goyal et al. [8] proposed a KP-ABE scheme which supports any monotonic access formula consisting of AND, OR, or threshold gates....
[...]
...While the proof of confidentiality in [8] relies critically on the construction of Tk(i) in the simulation, the key idea of the multi-authority scheme in [5] is that p(0) will be set as the PRF computed on the user’s GID, and thus this technique is independent of how Tk(i) is constructed....
[...]
3,610 citations
3,128 citations