In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), access policies associated with the ciphertexts are generally role-based and the attributes satisfying the policies are generally \emph{shared} by multiple users. If a malicious user, with his attributes shared with multiple other users, created a decryption blackbox for sale, this malicious user could be difficult to identify from the blackbox. Hence in practice, a useful CP-ABE scheme should have some tracing mechanism to identify this `traitor\u27 from the blackbox. In this paper, we propose the first CP-ABE scheme which simultaneously achieves (1) fully collusion-resistant blackbox traceability in the standard model, (2) full security in the standard model, and (3) on prime order...
Abstract. A Ciphertext-Policy Attribute-Based Encryption (CP-ABE) system extracts the decryption key...
Ciphertext-policy attribute-based encryption (CP-ABE) has been regarded as one of the promising solu...
A promising solution to protect data privacy in cloud storage services is known as ciphertext-policy...
Abstract. In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), access policies associated with ...
In the context of Ciphertext-Policy Attribute-Based Encryption (CP-ABE), if a decryption device asso...
Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encr...
Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encr...
In the existing attribute-based encryption (ABE) scheme, the authority (i.e., private key generator ...
In the existing attribute-based encryption (ABE) scheme, the authority (i.e., private key generator ...
As a sophisticated mechanism for secure fine-grained access control, ciphertext-policy attribute-bas...
Attribute-based encryption (ABE) is a promising cryptographic primitive that allows one-to-many encr...
Attribute-based encryption (ABE) is a promising cryptographic primitive that allows one-to-many encr...
To ensure the security of sensitive data, people need to encrypt them before uploading them to the p...
In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user may have multiple attribut...
A promising solution to protect data privacy in cloud storage services is known as ciphertext-policy...
Abstract. A Ciphertext-Policy Attribute-Based Encryption (CP-ABE) system extracts the decryption key...
Ciphertext-policy attribute-based encryption (CP-ABE) has been regarded as one of the promising solu...
A promising solution to protect data privacy in cloud storage services is known as ciphertext-policy...
Abstract. In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), access policies associated with ...
In the context of Ciphertext-Policy Attribute-Based Encryption (CP-ABE), if a decryption device asso...
Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encr...
Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encr...
In the existing attribute-based encryption (ABE) scheme, the authority (i.e., private key generator ...
In the existing attribute-based encryption (ABE) scheme, the authority (i.e., private key generator ...
As a sophisticated mechanism for secure fine-grained access control, ciphertext-policy attribute-bas...
Attribute-based encryption (ABE) is a promising cryptographic primitive that allows one-to-many encr...
Attribute-based encryption (ABE) is a promising cryptographic primitive that allows one-to-many encr...
To ensure the security of sensitive data, people need to encrypt them before uploading them to the p...
In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, a user may have multiple attribut...
A promising solution to protect data privacy in cloud storage services is known as ciphertext-policy...
Abstract. A Ciphertext-Policy Attribute-Based Encryption (CP-ABE) system extracts the decryption key...
Ciphertext-policy attribute-based encryption (CP-ABE) has been regarded as one of the promising solu...
A promising solution to protect data privacy in cloud storage services is known as ciphertext-policy...