Adaptively secure attribute-based encryption for traitor tracing
For the key abuse problem in attribute-based encryption (ABE),each user was identified by his unique identity, and the collusion secure codes and the traitor tracing mechanism were introduced to the ABE scheme. The definition,security model and tracing model for adaptively secure attribute-based enc...
Saved in:
| Main Authors: | ying MAHai, sun ZENGGuo, ping CHENJian, hua WANGJin, jun WANGZhan |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2016-01-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016009/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Adaptively secure attribute-based encryption for traitor tracing
by: ying MAHai, et al.
Published: (2016-01-01) -
Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
by: Lei SUN, et al.
Published: (2019-05-01) -
Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
by: Lei SUN, et al.
Published: (2019-05-01) -
Attribute-based proxy re-encryption scheme with multiple features
by: Chaosheng FENG, et al.
Published: (2019-06-01) -
Blockchain-Based Traceable Multi-Level Revocation Attribute-Based Encryption
by: Zhigang Xu, et al.
Published: (2024-01-01)