Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe
Author(s) -
Zhen Liu,
Duncan S. Wong
Publication year - 2015
Publication title -
the computer journal
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.319
H-Index - 64
eISSN - 1460-2067
pISSN - 0010-4620
DOI - 10.1093/comjnl/bxv101
Subject(s) - traitor tracing , revocation , computer science , attribute based encryption , computer security , ciphertext , traceability , encryption , set (abstract data type) , key (lock) , public key cryptography , theoretical computer science , programming language , overhead (engineering) , software engineering
A blackbox traceable Attribute-Based Encryption (ABE) can identify a malicious user called traitor, which created a decryption box with respect to an attribute set (respectively, access policy), out of all the users who share the same attribute set (respectively, access policy). However, none of the existing traceable ABE schemes can also support revocation and large attribute universe, that is, b...
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom