Adaptively secure attribute-based encryption for traitor tracing
For the key abuse problem in attribute-based encryption (ABE),each user was identified by his unique identity, and the collusion secure codes and the traitor tracing mechanism were introduced to the ABE scheme. The definition,security model and tracing model for adaptively secure attribute-based enc...
Saved in:
Main Authors: | ying MAHai, sun ZENGGuo, ping CHENJian, hua WANGJin, jun WANGZhan |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2016-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016009/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Collusion-free public-key traitor tracing scheme
by: WANG Qing-long1, et al.
Published: (2006-01-01) -
Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
by: Lei SUN, et al.
Published: (2019-05-01) -
Forward-secure ciphertext-policy attribute-based encryption scheme
by: EIJiang-hong W, et al.
Published: (2014-07-01) -
Attribute-based proxy re-encryption scheme with multiple features
by: Chaosheng FENG, et al.
Published: (2019-06-01) -
New adaptively secure key-policy attribute-based encryption scheme
by: Song LUO, et al.
Published: (2012-09-01)