Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Attribute-based encryption with non-monotonic access structures
Proceedings of the 14th ACM conference on Computer and communications security
Provably secure ciphertext policy ABE
Proceedings of the 14th ACM conference on Computer and communications security
Bounded Ciphertext Policy Attribute Based Encryption
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Distributed Attribute-Based Encryption
Information Security and Cryptology --- ICISC 2008
A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Improving privacy and security in multi-authority attribute-based encryption
Proceedings of the 16th ACM conference on Computer and communications security
Multi-authority attribute based encryption
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Extensions of access structures and their cryptographic applications
Applicable Algebra in Engineering, Communication and Computing
Revocation Systems with Very Small Private Keys
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
Expressive key-policy attribute-based encryption with constant-size ciphertexts
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Decentralizing attribute-based encryption
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Fuzzy identity-based encryption
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Constant size ciphertexts in threshold attribute-based encryption
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
Hi-index | 0.00 |
An attribute-based encryption scheme is a scheme in which each user is identified by a set of attributes, and some function of those attributes is used to determine decryption ability for each ciphertext. But as an extension for identity-based encryption scheme, the attribute-based schemes are also confronted with the key escrow problem. Furthermore, the attributes belonging to a user usually are monitored by different authorities. One approach to simultaneously resolve the two problems is multi-authority attribute-based encryption schemes, in which the secret keys of the users needed be distributed by different authorities. However, this solution comes at the cost of introducing extra infrastructure and communication. This paper gives a new approach, in which different attributes sets of a user are still certified by different authorities, but the secret key corresponding to the attributes is generated by the central authority. In order to resolve key escrow problem, different authorities generate secret value for the user, but the central authority cannot obtain the secret value. We give a general construction for multi-authority attribute-based encryption scheme using a general attribute-based encryption scheme. Finally, we present a concrete attribute-based encryption scheme secure against the malicious authorities.