logo

SCIENCE CHINA Information Sciences, Volume 59, Issue 11: 119102(2016) https://doi.org/10.1007/s11432-016-0062-7

Traceable and revocable CP-ABE with shorter ciphertexts

More info
  • ReceivedJan 21, 2016
  • AcceptedMar 14, 2016
  • PublishedSep 5, 2016

Abstract


Acknowledgment

Acknowledgments

This work was supported in part by National Natural Science Foundation of China (Grant Nos. 61371083, 61373154, 61411146001, 61402282), Prioritized Development Projects of the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20130073130004) and Shanghai Yang-Fan Plan (Grant No. 14YF1410400).


References

[1] Liu Z, Cao Z F, Wong D C S. White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. newblock IEEE Trans Inf Foren Secur, 2013, 8: 76-88 CrossRef Google Scholar

[2] Ning J T, Cao Z F, Dong X L, et al. Large universe ciphertext-policy attribute-based encryption with white-box traceability. In: Computer Security-ESORICS 2014. Berlin: Springer, 2014. 55--72. Google Scholar

[3] Ning J T, Dong X L, Cao Z F, et al. Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud. In: Computer Security--ESORICS 2015. Berlin: Springer, 2015. 270--289. Google Scholar

[4] Ning J T, Dong X L, Cao Z F, et al. White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. newblock IEEE Trans Inf Foren Secur, 2015, 10: 1274-1288 CrossRef Google Scholar

[5] Liu Z, Cao Z F, Wong D C S. Traceable cp-abe: how to trace decryption devices found in the wild. newblock IEEE Trans Inf Foren Secur, 2015, 10: 55-68 CrossRef Google Scholar

[6] Liu Z, Cao Z F, Wong D C S. Blackbox traceable cp-abe: how to catch people leaking their keys by selling decryption devices on ebay. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2013. 475--486. Google Scholar

[7] Garg S, Kumarasubramanian A, Sahai A, et al. Building efficient fully collusion-resilient traitor tracing and revocation schemes. In: Proceedings of the 17th ACM Conference on Computer and Communications Security. New York: ACM, 2010. 121--130. Google Scholar

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1