Decentralizing Attribute-Based Encryption

@inproceedings{Bishop2010DecentralizingAE,
  title={Decentralizing Attribute-Based Encryption},
  author={Allison Bishop and Brent Waters},
  booktitle={IACR Cryptology ePrint Archive},
  year={2010}
}
We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority and there is no requirement for any global coordination other than the creation of an initial set of common reference parameters. A party can simply act as an ABE authority by creating a public key and issuing private keys to different users that reflect their attributes. A user can encrypt data in terms of any boolean formula over attributes issued from any chosen set of… CONTINUE READING
Highly Influential
This paper has highly influenced 98 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 1,013 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 413 extracted citations

A Secure and Scalable Data Communication Scheme in Smart Grids

Wireless Communications and Mobile Computing • 2018
View 8 Excerpts
Method Support
Highly Influenced

Decentralized Policy-Hiding ABE with Receiver Privacy

ESORICS • 2018
View 4 Excerpts
Method Support
Highly Influenced

Decentralized Policy-Hiding Attribute-Based Encryption with Receiver Privacy

IACR Cryptology ePrint Archive • 2018
View 5 Excerpts
Method Support
Highly Influenced

1,014 Citations

0100200'10'13'16'19
Citations per Year
Semantic Scholar estimates that this publication has 1,014 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 52 references

Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions

IACR Cryptology ePrint Archive • 2009
View 10 Excerpts
Highly Influenced

Multi-authority Attribute Based Encryption

TCC • 2007
View 8 Excerpts
Highly Influenced

Attribute-based encryption for fine-grained access control of encrypted data

ACM Conference on Computer and Communications Security • 2006
View 11 Excerpts
Highly Influenced

Fuzzy Identity Based Encryption

IACR Cryptology ePrint Archive • 2004
View 9 Excerpts
Highly Influenced

Improving privacy and security in multi-authority attribute-based encryption

ACM Conference on Computer and Communications Security • 2009
View 6 Excerpts
Highly Influenced

Identity-based encryption secure under selective opening attack

M. Bellare, B. Waters, S. Yilek
In TCC, • 2011
View 1 Excerpt

Decentralizing attribute-based encryption

A. Lewko, B. Waters
Cryptology ePrint Archive, • 2010
View 1 Excerpt