{"title":"在密文策略下直接可撤销的基于属性的加密方案","authors":"Humera Aqeel, Syed Taqi Ali","doi":"10.1109/COMPTELIX.2017.8003999","DOIUrl":null,"url":null,"abstract":"Attribute-Based Encryption(ABE) came up as an significant cryptographic tool to envision secure fine-grained data sharing and access control. In this paper, we elaborate ABE to more expressive Ciphertext-policy Attribute-Based Encryption(CP-ABE) in consideration with Revocation which is a major issue to achieve in ABE. Specifically, we use direct revocation ABE which permits the trusted authority to revoke users by simply updating revocation list, without interacting with the non-revoked users which is not likely with respect to indirectly revocable ABE. We give a concrete construction and provides certain comparison parameters in order to determine efficiency of our scheme over other existing scheme.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"157 1","pages":"383-387"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Directly revocable Attribute Based Encryption scheme under Ciphertext-policy\",\"authors\":\"Humera Aqeel, Syed Taqi Ali\",\"doi\":\"10.1109/COMPTELIX.2017.8003999\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Attribute-Based Encryption(ABE) came up as an significant cryptographic tool to envision secure fine-grained data sharing and access control. In this paper, we elaborate ABE to more expressive Ciphertext-policy Attribute-Based Encryption(CP-ABE) in consideration with Revocation which is a major issue to achieve in ABE. Specifically, we use direct revocation ABE which permits the trusted authority to revoke users by simply updating revocation list, without interacting with the non-revoked users which is not likely with respect to indirectly revocable ABE. We give a concrete construction and provides certain comparison parameters in order to determine efficiency of our scheme over other existing scheme.\",\"PeriodicalId\":6917,\"journal\":{\"name\":\"2017 International Conference on Computer, Communications and Electronics (Comptelix)\",\"volume\":\"157 1\",\"pages\":\"383-387\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Computer, Communications and Electronics (Comptelix)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMPTELIX.2017.8003999\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPTELIX.2017.8003999","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Directly revocable Attribute Based Encryption scheme under Ciphertext-policy
Attribute-Based Encryption(ABE) came up as an significant cryptographic tool to envision secure fine-grained data sharing and access control. In this paper, we elaborate ABE to more expressive Ciphertext-policy Attribute-Based Encryption(CP-ABE) in consideration with Revocation which is a major issue to achieve in ABE. Specifically, we use direct revocation ABE which permits the trusted authority to revoke users by simply updating revocation list, without interacting with the non-revoked users which is not likely with respect to indirectly revocable ABE. We give a concrete construction and provides certain comparison parameters in order to determine efficiency of our scheme over other existing scheme.