Software Implementation of an Attribute-Based Encryption Scheme

@article{Zavattoni2014SoftwareIO,
  title={Software Implementation of an Attribute-Based Encryption Scheme},
  author={Eric Zavattoni and Luis J. Dominguez Perez and Shigeo Mitsunari and Ana H. S{\'a}nchez-Ram{\'i}rez and Tadanori Teruya and Francisco Rodr{\'i}guez-Henr{\'i}quez},
  journal={IEEE Transactions on Computers},
  year={2014},
  volume={64},
  pages={1429-1441}
}
A ciphertext-policy attribute-based encryption protocol uses bilinear pairings to provide control access mechanisms, where the set of user's attributes is specified by means of a linear secret sharing scheme. In this paper we present the design of a software cryptographic library that achieves record timings for the computation of a 126-bit security level attribute-based encryption scheme. We developed all the required auxiliary building blocks and compared the computational weight that each of… CONTINUE READING
Highly Cited
This paper has 27 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 17 extracted citations

Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices

IACR Cryptology ePrint Archive • 2017
View 10 Excerpts
Highly Influenced

Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme

IEEE Transactions on Information Forensics and Security • 2017
View 3 Excerpts

References

Publications referenced by this paper.
Showing 1-10 of 52 references

On the efficient implementation of pairing-based protocols

M. Scott
L. Chen, editor, IMA Int. Conf., volume 7089 of Lecture Notes in Computer Science, pages 296–308. Springer • 2011
View 20 Excerpts
Highly Influenced

Comparing Two Pairing-Based Aggregate Signature Schemes

IACR Cryptology ePrint Archive • 2009
View 4 Excerpts
Highly Influenced

Ciphertext-Policy Attribute-Based Encryption

2007 IEEE Symposium on Security and Privacy (SP '07) • 2007
View 4 Excerpts
Highly Influenced

Computing the Tate Pairing

CT-RSA • 2005
View 11 Excerpts
Highly Influenced

Guide to Elliptic Curve Cryptography

Springer Professional Computing • 2004
View 3 Excerpts
Highly Influenced

The realm of the pairings

P.S.L.M. Barreto, P. Longa, J. E. Ricardini
T. Lange, K. Lauter, and P. Lisonek, editors, Selected Areas in Cryptography - SAC 2013, volume 8282 of Lecture Notes in Computer Science, pages 3–25. Springer • 2014
View 1 Excerpt

Benchmark for MIRACL – Multiprecision Integer and Rational Arithmetic C/C++ Library - Certivox

M. Scott
http: //certivox.org/display/EXT/Benchmarks+and+Subs • 2013
View 1 Excerpt

Similar Papers

Loading similar papers…