z-logo
open-access-imgOpen Access
Practical Attribute-Based Encryption: Traitor Tracing, Revocation and Large Universe
Author(s) -
Zhen Liu,
Duncan S. Wong
Publication year - 2015
Publication title -
the computer journal
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.319
H-Index - 64
eISSN - 1460-2067
pISSN - 0010-4620
DOI - 10.1093/comjnl/bxv101
Subject(s) - traitor tracing , revocation , computer science , attribute based encryption , computer security , ciphertext , traceability , encryption , set (abstract data type) , key (lock) , public key cryptography , theoretical computer science , programming language , overhead (engineering) , software engineering
A blackbox traceable Attribute-Based Encryption (ABE) can identify a malicious user called traitor, which created a decryption box with respect to an attribute set (respectively, access policy), out of all the users who share the same attribute set (respectively, access policy). However, none of the existing traceable ABE schemes can also support revocation and large attribute universe, that is, b...

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom