logo

SCIENCE CHINA Information Sciences, Volume 59, Issue 9: 099105(2016) https://doi.org/10.1007/s11432-016-0012-9

Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption

More info
  • ReceivedJan 4, 2016
  • AcceptedMar 7, 2016
  • PublishedAug 18, 2016

Abstract


Funded by

National High Technology Research and Development Program of China(863 Program)

(2015AA016007)

National Natural Science Foundation of China(U1405255)

National Natural Science Foundation of China(61472310)


Acknowledgment

Acknowledgments

This work was supported by National High Technology Research and Development Program of China (863 Program) (Grant No. 2015AA016007), and National Natural Science Foundation of China (Grant Nos. U1405255, 61472310).


References

[1] Sahai A, Waters B. Fuzzy identity-based encryption. In: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, 2005. 457--473. Google Scholar

[2] Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, 2006. 89--98. Google Scholar

[3] Chase M. Multi-authority attribute based encryption. In: Proceedings of the 4th Theory of Cryptography Conference, Amsterdam, 2007. 515--534. Google Scholar

[4] Green M, Hohenberger S, Waters B. Outsourcing the decryption of ABE ciphertexts. In: Proceedings of the 20th USENIX Security Symposium, San Francisco, 2011. 523--538. Google Scholar

[5] Qin B, Deng R, Liu S, et al. Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans Inf Foren Secur, 2015, 10: 1384-1393 CrossRef Google Scholar

[6] Li K, Ma H. Outsourcing decryption of multi-authority ABE ciphertexts. Int J Netw Secur, 2014, 16: 286-294 Google Scholar

[7] Lewko A, Waters B. Decentralizing attribute-based encryption. In: Proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, 2011. 568--588. Google Scholar

[8] Rouselakis Y, Waters B. Efficient statically-secure large-universe multi-authority attribute-based encryption. In: Financial Cryptography and Data Security. Berlin: Springer, 2015. 315--332. Google Scholar

Copyright 2019 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1