Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Secure Integration of Asymmetric and Symmetric Encryption Schemes
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Attribute-based encryption for fine-grained access control of encrypted data
Proceedings of the 13th ACM conference on Computer and communications security
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
Controlling data in the cloud: outsourcing computation without outsourcing control
Proceedings of the 2009 ACM workshop on Cloud computing security
Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures
DASC '09 Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
HCX: A Distributed OSGi Based Web Interaction System for Sharing Health Records in the Cloud
WI-IAT '10 Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
Developing a secure distributed OSGI cloud computing infrastructure for sharing health records
AIS'11 Proceedings of the Second international conference on Autonomous and intelligent systems
Hierarchical identity based encryption with constant size ciphertext
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Hi-index | 0.00 |
We present several extensions to the ciphertext-policy attribute-based encryption CP-ABE scheme, first introduced by Bethencourt et al. in 2007, to support operation in a distributed environment with multiple attribute authorities. Unlike other efforts in creating a multi-authority attribute-based encryption schemes our extensions allow for each authority to be designated a subset of attributes and work independently in creating user keys i.e. a user need only contact a single authority for their secret key. Additionally, we show that the presented extensions have a minimal impact on performance compared to standard CP-ABE and that both the performance of CP-ABE and our extensions can be improved by computing parts of the user and authority keys in parallel. We also discuss the use of CP-ABE in protecting data confidentiality in public cloud environments.