Skip to main content

Advertisement

Log in

Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Sahai A, Waters B. Fuzzy identity-based encryption. In: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, 2005. 457–473

    Google Scholar 

  2. Goyal V, Pandey O, Sahai A, et al. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, 2006. 89–98

    Google Scholar 

  3. Chase M. Multi-authority attribute based encryption. In: Proceedings of the 4th Theory of Cryptography Conference, Amsterdam, 2007. 515–534

    Chapter  Google Scholar 

  4. Green M, Hohenberger S, Waters B. Outsourcing the decryption of ABE ciphertexts. In: Proceedings of the 20th USENIX Security Symposium, San Francisco, 2011. 523–538

    Google Scholar 

  5. Qin B, Deng R, Liu S, et al. Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans Inf Foren Secur, 2015, 10: 1384–1393

    Article  Google Scholar 

  6. Li K, Ma H. Outsourcing decryption of multi-authority ABE ciphertexts. Int J Netw Secur, 2014, 16: 286–294

    Google Scholar 

  7. Lewko A, Waters B. Decentralizing attribute-based encryption. In: Proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, 2011. 568–588

    Google Scholar 

  8. Rouselakis Y, Waters B. Efficient statically-secure large-universe multi-authority attribute-based encryption. In: Financial Cryptography and Data Security. Berlin: Springer, 2015. 315–332

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianfeng Ma.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, K., Ma, J., Liu, J. et al. Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption. Sci. China Inf. Sci. 59, 99105 (2016). https://doi.org/10.1007/s11432-016-0012-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-016-0012-9

Navigation

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy