Decentralizing Attribute-Based Encryption
@inproceedings{Bishop2010DecentralizingAE, title={Decentralizing Attribute-Based Encryption}, author={Allison Bishop and Brent Waters}, booktitle={IACR Cryptology ePrint Archive}, year={2010} }
- Published 2010 in IACR Cryptology ePrint Archive
DOI:10.1007/978-3-642-20465-4_31
We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority and there is no requirement for any global coordination other than the creation of an initial set of common reference parameters. A party can simply act as an ABE authority by creating a public key and issuing private keys to different users that reflect their attributes. A user can encrypt data in terms of any boolean formula over attributes issued from any chosen set of… CONTINUE READING
From This Paper
Figures, tables, and topics from this paper.
Figures & Tables
Citations
Publications citing this paper.
Showing 1-10 of 413 extracted citations
A Novel Efficient Pairing-Free CP-ABE Based on Elliptic Curve Cryptography for IoT
View 14 Excerpts
Highly Influenced
A Secure and Scalable Data Communication Scheme in Smart Grids
View 8 Excerpts
Method Support
Highly Influenced
An Efficient and Secure Attribute-Based Signcryption Scheme for Smart Grid Applications
View 8 Excerpts
Highly Influenced
Decentralized Policy-Hiding ABE with Receiver Privacy
View 4 Excerpts
Method Support
Highly Influenced
Decentralized Policy-Hiding Attribute-Based Encryption with Receiver Privacy
View 5 Excerpts
Method Support
Highly Influenced
Efficient and Secure Access Control Scheme in the Standard Model for Vehicular Cloud Computing
View 7 Excerpts
Highly Influenced
Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption
View 7 Excerpts
Highly Influenced
On the Design of a Decentralized and Multiauthority Access Control Scheme in Federated and Cloud-Assisted Cyber-Physical Systems
View 9 Excerpts
Highly Influenced
PHOABE: Securely outsourcing multi-authority attribute based encryption with policy hidden for cloud assisted IoT
View 11 Excerpts
Highly Influenced
PriGuarder: A Privacy-Aware Access Control Approach Based on Attribute Fuzzy Grouping in Cloud Environments
View 4 Excerpts
Highly Influenced
Citation Statistics
1,014 Citations
Citations per Year
Semantic Scholar estimates that this publication has 1,014 citations based on the available data.
See our FAQ for additional information.
References
Publications referenced by this paper.
Showing 1-10 of 52 references
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
View 10 Excerpts
Highly Influenced
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
View 10 Excerpts
Highly Influenced
Fully Secure HIBE with Short Ciphertexts
View 11 Excerpts
Highly Influenced
Multi-authority Attribute Based Encryption
View 8 Excerpts
Highly Influenced
Attribute-based encryption for fine-grained access control of encrypted data
View 11 Excerpts
Highly Influenced
Fuzzy Identity Based Encryption
View 9 Excerpts
Highly Influenced
Improving privacy and security in multi-authority attribute-based encryption
View 6 Excerpts
Highly Influenced
Identity-based encryption secure under selective opening attack
View 1 Excerpt
Decentralizing attribute-based encryption
View 1 Excerpt