Attribute-based encryption

Known as: Abe, Attribute based encryption 
Attribute-based encryption is a type of public-key encryption in which the secret key of a user and the ciphertext are dependent upon attributes (e.g… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Attribute-based encryption (ABE) is a public-key-based one-to-many encryption that allows users to encrypt and decrypt data based… (More)
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority and there… (More)
  • table 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Attribute based encryption (ABE) [13] determines decryption ability based on a user's attributes. In a multi-authority ABE scheme… (More)
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2008
Highly Cited
2008
In a ciphertext policy attribute based encryption system, a user’s private key is associated with a set of attributes (describing… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE) under concrete and noninteractive… (More)
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In an identity based encryption scheme, each user is identified by a unique identity string. An attribute based encryption scheme… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We construct an Attribute-Based Encryption (ABE) scheme that allows a user's private key to be expressed in terms of any access… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy Identity-Based Encryption. In Fuzzy IBE we… (More)
Is this relevant?