Attribute-based encryption schema with group signatures

Cipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data.In CP-ABE,When the users access the cipher text,the access structure and the cipher text were sent to the users.However,the access structure is also has private information which can lead to l...

Full description

Saved in:
Bibliographic Details
Main Authors: Xinglan ZHANG, Yao CUI
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2019-02-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019002
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530088798027776
author Xinglan ZHANG
Yao CUI
author_facet Xinglan ZHANG
Yao CUI
author_sort Xinglan ZHANG
collection DOAJ
description Cipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data.In CP-ABE,When the users access the cipher text,the access structure and the cipher text were sent to the users.However,the access structure is also has private information which can lead to leak of the privacy.The group signatures were used in CP-ABE to realize protection of the privacy.What’s more,it can satisfy indistinguishable under the choice of plaintext attack.
format Article
id doaj-art-cde688610f554d7788699adb3e856fdd
institution Kabale University
issn 2096-109X
language English
publishDate 2019-02-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-cde688610f554d7788699adb3e856fdd2025-01-15T03:13:17ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2019-02-015152159555157Attribute-based encryption schema with group signaturesXinglan ZHANGYao CUICipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data.In CP-ABE,When the users access the cipher text,the access structure and the cipher text were sent to the users.However,the access structure is also has private information which can lead to leak of the privacy.The group signatures were used in CP-ABE to realize protection of the privacy.What’s more,it can satisfy indistinguishable under the choice of plaintext attack.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019002attribute-based encryptiongroup signaturesaccess structureleak of the privacy
spellingShingle Xinglan ZHANG
Yao CUI
Attribute-based encryption schema with group signatures
网络与信息安全学报
attribute-based encryption
group signatures
access structure
leak of the privacy
title Attribute-based encryption schema with group signatures
title_full Attribute-based encryption schema with group signatures
title_fullStr Attribute-based encryption schema with group signatures
title_full_unstemmed Attribute-based encryption schema with group signatures
title_short Attribute-based encryption schema with group signatures
title_sort attribute based encryption schema with group signatures
topic attribute-based encryption
group signatures
access structure
leak of the privacy
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2019002
work_keys_str_mv AT xinglanzhang attributebasedencryptionschemawithgroupsignatures
AT yaocui attributebasedencryptionschemawithgroupsignatures