Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts

@inproceedings{Attrapadung2011ExpressiveKA,
  title={Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts},
  author={Nuttapong Attrapadung and B. Libert and E. D. Panafieu},
  booktitle={Public Key Cryptography},
  year={2011}
}
  • Nuttapong Attrapadung, B. Libert, E. D. Panafieu
  • Published in Public Key Cryptography 2011
  • Computer Science
  • Attribute-based encryption (ABE), as introduced by Sahai and Waters, allows for fine-grained access control on encrypted data. In its key-policy flavor, the primitive enables senders to encrypt messages under a set of attributes and private keys are associated with access structures that specify which ciphertexts the key holder will be allowed to decrypt. In most ABE systems, the ciphertext size grows linearly with the number of ciphertext attributes and the only known exceptions only support… CONTINUE READING
    Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
    • 43

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 55 REFERENCES
    Attribute-based encryption for fine-grained access control of encrypted data
    • 4,301
    • Highly Influential
    • PDF
    Ciphertext-Policy Attribute-Based Encryption
    • 3,479
    • PDF
    Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
    • 1,542
    • Highly Influential
    • PDF
    Provably secure ciphertext policy ABE
    • 735
    • PDF
    Bounded Ciphertext Policy Attribute Based Encryption
    • 549
    • Highly Influential
    • PDF
    Constant Size Ciphertexts in Threshold Attribute-Based Encryption
    • 211
    • PDF
    Conjunctive Broadcast and Attribute-Based Encryption
    • 226
    Multi-authority Attribute Based Encryption
    • 902
    • PDF
    Hierarchical Identity Based Encryption with Constant Size Ciphertext
    • 1,238
    • PDF
    Improving privacy and security in multi-authority attribute-based encryption
    • 810
    • PDF