Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Secure attribute-based systems
Proceedings of the 13th ACM conference on Computer and communications security
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Attribute-based encryption with non-monotonic access structures
Proceedings of the 14th ACM conference on Computer and communications security
Provably secure ciphertext policy ABE
Proceedings of the 14th ACM conference on Computer and communications security
Bounded Ciphertext Policy Attribute Based Encryption
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
Lower bounds for discrete logarithms and related problems
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Multi-authority attribute based encryption
TCC'07 Proceedings of the 4th conference on Theory of cryptography
A forward-secure public-key encryption scheme
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Identity-based broadcast encryption with constant size ciphertexts and private keys
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
Hierarchical identity based encryption with constant size ciphertext
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Biometric identity based signature revisited
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Generic constructions of biometric identity based encryption systems
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Hi-index | 0.00 |
The fuzzy identity-based encryption schemes are attribute-basedencryption schemes such that each party with the private key for anattribute set $\mathcal{S}$ is allowed to decrypt ciphertextsencrypted by an attribute set $\mathcal{S}'$, if and only if thetwo sets $\mathcal{S}$ and $\mathcal{S}'$ are close to each otheras measured by the set-overlap-distance metric. That is, there is athreshold t and, if t out of n attributes of $\mathcal{S}$ are also included in $\mathcal{S}'$,the receivers can decrypt the ciphertexts. In previous schemes,this threshold t is fixed when private keys are generatedand the length of ciphertexts are linear to n . In thispaper, we propose a novel fuzzy identity-based encryption schemewhere the threshold t is flexible by nature and the lengthof ciphertexts are linear to n - t . The latterproperty makes the scheme short if it allows receivers to decryptciphertexts when error rate n - t , i.e., distancebetween the two attribute sets, is low.