Attribute-based encryption schema with group signatures

Cipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data. In CP-ABE, When the users access the cipher text, the access structure and the cipher text were sent to the users. However, the access structure is also has private information which can lead...

Full description

Bibliographic Details
Main Author: ZHANG Xinglan, CUI Yao
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2019-02-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2019002
_version_ 1818669626366623744
author ZHANG Xinglan, CUI Yao
author_facet ZHANG Xinglan, CUI Yao
author_sort ZHANG Xinglan, CUI Yao
collection DOAJ
description Cipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data. In CP-ABE, When the users access the cipher text, the access structure and the cipher text were sent to the users. However, the access structure is also has private information which can lead to leak of the privacy. The group signatures were used in CP-ABE to realize protection of the privacy.What’s more, it can satisfy indistinguishable under the choice of plaintext attack.
first_indexed 2024-12-17T06:55:12Z
format Article
id doaj.art-bc6ef8f68e7a4a8d9c6c390896fa036d
institution Directory Open Access Journal
issn 2096-109X
language English
last_indexed 2024-12-17T06:55:12Z
publishDate 2019-02-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj.art-bc6ef8f68e7a4a8d9c6c390896fa036d2022-12-21T21:59:27ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2019-02-0151152110.11959/j.issn.2096-109x.2019002Attribute-based encryption schema with group signaturesZHANG Xinglan, CUI Yao0Department of Information, Beijing University of Technology, Beijing 100124, ChinaCipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data. In CP-ABE, When the users access the cipher text, the access structure and the cipher text were sent to the users. However, the access structure is also has private information which can lead to leak of the privacy. The group signatures were used in CP-ABE to realize protection of the privacy.What’s more, it can satisfy indistinguishable under the choice of plaintext attack.http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2019002attribute-based encryptiongroup signaturesaccess structureleak of the privacy
spellingShingle ZHANG Xinglan, CUI Yao
Attribute-based encryption schema with group signatures
网络与信息安全学报
attribute-based encryption
group signatures
access structure
leak of the privacy
title Attribute-based encryption schema with group signatures
title_full Attribute-based encryption schema with group signatures
title_fullStr Attribute-based encryption schema with group signatures
title_full_unstemmed Attribute-based encryption schema with group signatures
title_short Attribute-based encryption schema with group signatures
title_sort attribute based encryption schema with group signatures
topic attribute-based encryption
group signatures
access structure
leak of the privacy
url http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2019002
work_keys_str_mv AT zhangxinglancuiyao attributebasedencryptionschemawithgroupsignatures